Analysis and management algorithm of complex security based on cognitive modeling
DOI:
https://doi.org/10.15587/2312-8372.2014.31870Keywords:
information security, integrated security, cognitive modeling, information systemAbstract
The features of information security system creation, taking into account the subjective side of the process are analyzed in the article. The main aim of investigation is algorithm developing of analysis and management of integrated security, which will unify approaches to information security management. Security does not exist in itself, apart from person. It provided for a person and it is estimated by person. Therefore, the concept of security is not only objective, but also subjective side, because of its evaluation is carried out in the end by person. Use of cognitive modeling can significantly improve the processes of analysis and safety management of information system. Benefits of cognitive approach is the possibility of semi-structured system modeling (bad formalized), which are characterized by incomplete or uncertain information about them. Algorithm application will allow experts in the field of information security begin to develop appropriate computational procedures and modules that can be further used in the construction of information security systems. Investigation results will be useful for services that deal with information security.References
- Gaidamakin, N. A. (2003). Razgranichenie dostupa k informatsii v komp'iuternyh sistemah. E.: Ural, 328.
- Zegzhda, D. P., Ivashko, A. M. (2000). Osnovy bezopasnosti informatsionnyh sistem. M.: Telekom, 286.
- Devianin, P. N. (2005). Modeli bezopasnosti komp'iuternyh sistem. M.: Akademiia, 144.
- Kort, S. S. (2004). Teoreticheskie osnovy zashchity informatsii. M.: Gelios, 240.
- Kurilo, A. P., Zefirova, S. L., Golovanov, V. B. (2006). Audit informatsionnoi bezopasnosti. M.: BDTs-press, 304.
- Saderdinov, A. A., Trainev, V. A., Fedulov, A. A. (2005). Informatsionnaia bezopasnost'. M.: Dashkovka, 336.
- Petrenko, S. A., Simonov, S. V. (2005). Upravlenie informatsionnymi riskami. Ekonomicheski opravdana bezopasnost'. M.: Press, 384.
- Borisov, V. V., Kruglov, V. V., Fedulov, A. S. (2007). Nechetkie modeli i seti. M.: Telekom, 284.
- Raikov, A. N. (2000). Intellektual'nye informatsionnye tehnologii. M.: MGIREA (TU), 96.
- Vasil'ev, V. I., Kudriavtseva, G. T. (2007). Analiz i upravlenie informatsionnoi bezopasnost'iu vuzov na osnove kognitivnogo modelirovaniia. Sistemy upravleniia i informatsionnye tehnologii, № 1, T. 27, 74-81.
- Azhmuhamedov, I. M. (2010). Upravlenie informatsionnoi bezopasnost'iu regiona na osnove kognitivnogo modelirovaniia. Vestnik AGTU, № 1, 96-102.
- Azhmuhamedov, I. M. (2009). Modelirovanie na osnove ekspertnyh suzhdenii protsessa otsenki informatsionnoi bezopasnosti. Vestnik AGTU, № 2, 101-109.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2016 Валерій Валерійович Козловський, Андрій Віталійович Міщенко, В'ячеслав Володимирович Сніжко
This work is licensed under a Creative Commons Attribution 4.0 International License.
The consolidation and conditions for the transfer of copyright (identification of authorship) is carried out in the License Agreement. In particular, the authors reserve the right to the authorship of their manuscript and transfer the first publication of this work to the journal under the terms of the Creative Commons CC BY license. At the same time, they have the right to conclude on their own additional agreements concerning the non-exclusive distribution of the work in the form in which it was published by this journal, but provided that the link to the first publication of the article in this journal is preserved.