Analysis and management algorithm of complex security based on cognitive modeling

Authors

DOI:

https://doi.org/10.15587/2312-8372.2014.31870

Keywords:

information security, integrated security, cognitive modeling, information system

Abstract

The features of information security system creation, taking into account the subjective side of the process are analyzed in the article. The main aim of investigation is algorithm developing of analysis and management of integrated security, which will unify approaches to information security management. Security does not exist in itself, apart from person. It provided for a person and it is estimated by person. Therefore, the concept of security is not only objective, but also subjective side, because of its evaluation is carried out in the end by person. Use of cognitive modeling can significantly improve the processes of analysis and safety management of information system. Benefits of cognitive approach is the possibility of semi-structured system modeling (bad formalized), which are characterized by incomplete or uncertain information about them. Algorithm application will allow experts in the field of information security begin to develop appropriate computational procedures and modules that can be further used in the construction of information security systems. Investigation results will be useful for services that deal with information security.

Author Biographies

Валерій Валерійович Козловський, National Aviation University, 1, Avenue Kosmonavta Komarova, Kyiv, 03680

Doctor of Technical Sciences, Professor, Head of the Department

Department of information security systems

Андрій Віталійович Міщенко, National Aviation University, 1, Avenue Kosmonavta Komarova, Kyiv, 03680

Candidate of Technical Sciences, Professor

Department of information security systems

В'ячеслав Володимирович Сніжко, National Aviation University, 1, Avenue Kosmonavta Komarova, Kyiv, 03680

Postgraduate student

Department of information security systems

References

  1. Gaidamakin, N. A. (2003). Razgranichenie dostupa k informatsii v komp'iuternyh sistemah. E.: Ural, 328.
  2. Zegzhda, D. P., Ivashko, A. M. (2000). Osnovy bezopasnosti informatsionnyh sistem. M.: Telekom, 286.
  3. Devianin, P. N. (2005). Modeli bezopasnosti komp'iuternyh sistem. M.: Akademiia, 144.
  4. Kort, S. S. (2004). Teoreticheskie osnovy zashchity informatsii. M.: Gelios, 240.
  5. Kurilo, A. P., Zefirova, S. L., Golovanov, V. B. (2006). Audit informatsionnoi bezopasnosti. M.: BDTs-press, 304.
  6. Saderdinov, A. A., Trainev, V. A., Fedulov, A. A. (2005). Informatsionnaia bezopasnost'. M.: Dashkovka, 336.
  7. Petrenko, S. A., Simonov, S. V. (2005). Upravlenie informatsionnymi riskami. Ekonomicheski opravdana bezopasnost'. M.: Press, 384.
  8. Borisov, V. V., Kruglov, V. V., Fedulov, A. S. (2007). Nechetkie modeli i seti. M.: Telekom, 284.
  9. Raikov, A. N. (2000). Intellektual'nye informatsionnye tehnologii. M.: MGIREA (TU), 96.
  10. Vasil'ev, V. I., Kudriavtseva, G. T. (2007). Analiz i upravlenie informatsionnoi bezopasnost'iu vuzov na osnove kognitivnogo modelirovaniia. Sistemy upravleniia i informatsionnye tehnologii, № 1, T. 27, 74-81.
  11. Azhmuhamedov, I. M. (2010). Upravlenie informatsionnoi bezopasnost'iu regiona na osnove kognitivnogo modelirovaniia. Vestnik AGTU, № 1, 96-102.
  12. Azhmuhamedov, I. M. (2009). Modelirovanie na osnove ekspertnyh suzhdenii protsessa otsenki informatsionnoi bezopasnosti. Vestnik AGTU, № 2, 101-109.

Published

2014-12-23

How to Cite

Козловський, В. В., Міщенко, А. В., & Сніжко, В. В. (2014). Analysis and management algorithm of complex security based on cognitive modeling. Technology Audit and Production Reserves, 6(4(20), 25–28. https://doi.org/10.15587/2312-8372.2014.31870

Issue

Section

Information technology and control systems