PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
2017 | nr 3 | 147--167
Tytuł artykułu

Development of a Support System for Managing the Cyber Protection of an Information Object

Warianty tytułu
Rozwój systemu wsparcia dla zarządzania cyberbezpieczeństwem obiektu
Języki publikacji
EN
Abstrakty
EN
The information is being discussed and its characteristics in the system of enterprise management. The model of operational management information and cyber security (CS) object forms a rational set of remedies based on morphological approach. Unlike existing solutions, the model prepared on the basis of intelligent decision support, a morphological matrix for each facility's perimeters of information protection, and can generate a set of options for remedies which take into account the compatibility of software and hardware. The choice of the optimal option set for that perimeter protection of information, implements an objective function that maximizes the ratio of the sum "security information" to the total rate "cost." (original abstract)
W artykule omówione zostały informacje i ich cechy charakterystyczne w systemie zarządzania przedsiębiorstwem. Model zarządzania operacyjnego informacji i przedmiot cyberbezpieczeństwa (CS) tworzy racjonalny zestaw środków zaradczych na podstawie morfologicznego podejścia. W przeciwieństwie do istniejących rozwiązań model ten został opracowany na podstawie inteligentnego wsparcia decyzji, matrycy morfologicznej dla każdego obwodu ochrony informacji i może generować zestaw opcji środków zaradczych, które uwzględniają kompatybilność oprogramowania i sprzętu. Wybór optymalnej opcji dla ochrony obwodowej informacji realizuje obiektywną funkcję, która maksymalizuje stosunek sumy "informacji o bezpieczeństwie" do całkowitego kosztu. (abstrakt oryginalny)
Rocznik
Numer
Strony
147--167
Opis fizyczny
Twórcy
  • European University, Ukraine
  • AGH University of Science and Technology Kraków, Poland
autor
  • European University, Ukraine
Bibliografia
  • Al-Jarrah O., Arafat A., Network Intrusion Detection System using attack behavior classification, "Information and Communication Systems (ICICS)", 5th International Conference, 2014.
  • Atymtayeva L., Kozhakhmet K., Bortsova G., Building a Knowledge Base for Expert System in Information Security, Chapter Soft Computing in Artificial Intelligence of the series Advances in "Intelligent Systems and Computing", Vol. 270, 2014.
  • Ben-Asher N., Gonzalez C., Effects of cyber security knowledge on attack detection, Computers in Human Behavior, 48, 2015.
  • Bosak I.P., Palyha Ie.M., Informatsiine zabezpechennia upravlinnia pidpryiemstvom: ekonomichnyi aspect, "Rehionalna ekonomika", 4, 2007.
  • Cavusoglu H., Srinivasan R., Wei T.Y., Decision-theoretic and game-theoretic approaches to IT security investment, "Journal of Management Information Systems (ACySe)", 25(2), 2008.
  • Demetz L., Bachlechner D., To Invest or Not to Invest? Assessing the Economic Viability of a Policy and Security Configuration Management Tool, "The Economics of Information Security and Privacy", Springer, Heidelberg, 2013.
  • Gamal M.M., Hasan B., Hegazy A.F., A Security Analysis Framework Powered by an Expert System, "International Journal of Computer Science and Security", 4(6), 2011.
  • Garasymchuk О.І., Kostiv Y.M., Assessment of the effectiveness systems protection of information, "Vestnik KNU imeni Mikhaila Ostrogradskogo", 1(66), 2011.
  • Gutzwiller R.S., Hunt S.M., Lange D.S., A task analysis toward characterizing cyber-cognitive situation awareness (CCSA) in cyber defense analysts, Cognitive Methods in Situation Awareness and Decision Support (CogSIMA), "IEEE International Multi-Disciplinary Conference", 2016.
  • Kaliuzhnyi R., Shvets M., Shamrai V. [in:] Kaliuzhnoho R., Shamraia V. Informatsiine zabezpechennia upravlinskoi diialnosti v umovakh informatyzatsii: orhanizatsiino-pravovi pytannia teorii i praktyky, Kiyv, 2002.
  • Kanatov M., Atymtayeva L., Yagaliyeva B., Expert systems for information security management and audit, Implementation phase issues, Soft Computing and Intelligent Systems (SCIS), Joint 7th "International Conference on and Advanced Intelligent Systems (ISIS)", 2014.
  • Kearney W., Kruger H., Theorising on risk homeostasis in the context of information security behavior, "Information and Computer Security", 24(5), 2015.
  • Koposov H.A., Nahornaia Y.Y., Pryntsypy ekonomycheskoi bezopasnosty predpryiatyia, II Mizhnarodnoi naukovoi konferentsii, Cherkasy 2005.
  • Lakhno V., Malyukov V., Domrachev V., Stepanenko O., Kramarov O., Development of a system for the detection of cyber attacks based on the clustering and formation of reference deviations of attributes, "Eastern-European Journal of Enterprise Technologies" 2017, 3/9 (87).
  • Lahno V., Ensuring of information processes' reliability and security in critical application data processing systems, "MEST Journal", 2(1), 2014.
  • Lakhno V., Petrov A., Ensuring security of automated information systems, transportation companies with the intensification of traffic, Ukraine, 2011.
  • Lakhno V., Tkach Y., Petrenko T., Zaitsev S., Bazylevych V., Development of adaptive expert system of information security using a procedure of clustering the attributes of anomalies and cyber attacks, "Eastern-European Journal of Enterprise Technologies", 9(84), 2016.
  • Lakhno V.A., Kravchuk P.U., Mekhed D.B., Mohylnyi H.A., Donchenko V.U., Development of a support system for managing the cyber protection of an information object, "Journal of Theoretical and Applied Information Technology", 95(6), 2017.
  • Linda O., Manic M., Vollmer T., Wright J., Fuzzy logic based anomaly detection for embedded network security cyber sensor, "Computational Intelligence in Cyber Security (CICS)", IEEE Symposium on 11-15 April 2011.
  • Li-Yun Chang, Zne-Jung Lee, Applying fuzzy expert system to information security risk Assessment - A case study on an attendance system, "International Conference on Fuzzy Theory and Its Applications" 2013.
  • Louvieris P., Clewley N., Liu X., Effects-based feature identification for network intrusion detection, Neurocomputing, 121(9), 2013.
  • Oglaza A., Laborde R., Zarate P., Authorization Policies: Using Decision Support System for Context-Aware Protection of User's Private Data, Trust, "Security and Privacy in Computing and Communications (TrustCom)", 12th IEEE International Conference on 16-18 July 2013.
  • Paliwal S., Gupta R. Denial-of-Service, Probing & Remote to User (R2L) Attack Detection using Genetic Algorithm, "International Journal of Computer Applications", 60(19), 2012.
  • Panaousis E., Fielder A., Malacaria P., Hankin C., Smeraldi F., Cybersecurity Games and Investments: A Decision Support Approach, Chapter "Decision and Game Theory for Security" of the series Lecture Notes in Computer Science, 8840, 2014.
  • Reesa L.P., Deanea J.K., Rakesa T.R., Bakerb W.H., Decision support for Cybersecurity risk planning, "Decision Support Systems", 51(3), 2011.
  • Tkachuk T.P., Formuvannia systemy informatsiinoi bezpeky biznesu, "Biznes i bezpeka", 4, 2009.
  • Tsymbaliuk V.S. Informatsiina bezpeka pidpryiemnytskoi diialnosti: vyznachennia sutnosti tazmistu poniattia za umov vkhodzhennia Ukrainy do informatsiinoho suspilstva (hlobalni kibertsyvilizatsii), "Pidpryiemnytstvo, hospodarstvo i parvo", 3, 2007.
  • Valenzuela J., Wang J., Bissinger N., Real-Time Intrusion Detection in Power System Operations, "IEEE Transactions on Power Systems", 28(2), 2013.
  • Verma R., Kantarcioglu M., Marchette D., Leiss E., Solorio T., Security Analytics: Essential Data Analytics Knowledge for Cybersecurity Professionals and Students, "IEEE Security & Privacy", 13(6), 2015.
  • Zhang Y., Wang L., Sun W., Green R.C., Alam M., Distributed Intrusion Detection System in a Multi-Layer Network Architecture of Smart Grids, "IEEE Transactions on Smart Grid", 2(4), 2011.
Typ dokumentu
Bibliografia
Identyfikatory
Identyfikator YADDA
bwmeta1.element.ekon-element-000171497171

Zgłoszenie zostało wysłane

Zgłoszenie zostało wysłane

Musisz być zalogowany aby pisać komentarze.
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.