Запис Детальніше

DEVELOPMENT OF A SUPPORT SYSTEM FOR MANAGING THE CYBER SECURITY

Науковий журнал «Радіоелектроніка, інформатика, управління»

Переглянути архів Інформація
 
 
Поле Співвідношення
 
##plugins.schemas.marc.fields.042.name## dc
 
##plugins.schemas.marc.fields.245.name## DEVELOPMENT OF A SUPPORT SYSTEM FOR MANAGING THE CYBER SECURITY
 
##plugins.schemas.marc.fields.720.name## Lakhno, V. A.; European University, Kyiv
 
##plugins.schemas.marc.fields.653.name## Information safety; information security management; decision support system; morphological approach
 
##plugins.schemas.marc.fields.520.name## <p>Context. In this paper the urgent problem of development of software of decision making support systems in information security is solved. Approach is based on a choice of rational options of response to events taking into account operational state-of-health data of a subject to protection.</p><p>Objective. Goal of the research is developing a cyber-threats counterwork model using decision support system, choosing rational variants of reactions on the occurrences in cybersecurity, and taking into account current operational data.</p><p>Method. The information object cyber security operational management system and the formation of the protection methods rational sets model which is based on a morphological approach is developed. It is proposed to find an optimal variant of the information security perimeter sets using an object function that maximizes the correlation of a consolidated figure of “information security” to consolidated figure “costs”.</p><p>Results. A model for the operational management of cyber security-critical computer systems was developed. This model allows us to generate different variants of protection sets that are compliant with a computer system taking into account morphological matrices for each security perimeter prepared with the intelligent decision support system. It is proved that the use of the developed decision support systems can significantly reduce the costs planned for the complex means of cyber defense, as well as reduce the time to inform decisionmakers<br />on how to counter the identified information security incidents.</p><p>Conclusions. Scientific novelty of research consists that the model of operational management of cyber security of an information objects and formation of a rational complex of security features based on morphological approach is for the first time offered. The practical value of the developed methods and instruments is that they allow: to reduce time of development of systems of cyber security, to increase efficiency of planning of rational modular composition of security features due to creation of information and software environment in case of design; to increase validity of the made decisions on operational and to organizational technical control by protection</p>
 
##plugins.schemas.marc.fields.260.name## Zaporizhzhya National Technical University
2017-11-09 11:20:22
 
##plugins.schemas.marc.fields.856.name## application/pdf
http://ric.zntu.edu.ua/article/view/112332
 
##plugins.schemas.marc.fields.786.name## Radio Electronics, Computer Science, Control; No 2 (2017): Radio Electronics, Computer Science, Control
 
##plugins.schemas.marc.fields.546.name## en
 
##plugins.schemas.marc.fields.540.name## Copyright (c) 2017 V. A. Lakhno