Vestnik of Astrakhan State Technical University. Series: Management, Computer Sciences and Informatics
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
General information
Latest issue
Archive
Impact factor

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



Vestn. Astrakhan State Technical Univ. Ser. Management, Computer Sciences and Informatics:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


Vestnik of Astrakhan State Technical University. Series: Management, Computer Sciences and Informatics, 2015, Number 1, Pages 66–77 (Mi vagtu360)  

This article is cited in 2 scientific papers (total in 2 papers)

SOCIAL AND ECONOMIC SYSTEMS MANAGEMENT

Unification of the approaches to control of the level of information security in different organizations

I. M. Azhmukhamedova, O. M. Knyazevab

a Astrakhan State Technical University
b Ltd. "UpGrade"
Full-text PDF (713 kB) Citations (2)
References:
Abstract: A unified method of the level of information security control is developed; it includes two stages: assessment of the current level of information security based on the fuzzy production rules and synthesis of the control decisions based on the application of fuzzy cognitive modeling to bring information security services to the desired target level. The algorithm for assessment of the level of information security is presented in the form of the iterative process, involving the following steps: verbal assessment of the level of damage; search for the relevant rules in the knowledge base; assessment of the state security services at the current level of the hierarchy according to the rules; identifying and excluding from consideration of the blocks containing the damage, the level of which does not allow identification of some blocks at the next level; calculation of integral evaluation of security services and generalized index of information security of the information object in general. The proposed method of assessment of the level of information security does not provide the solution of generating control solutions for information security services output to the desired target level, since it does not contain information about the cause-and-effect relationships between the observed damage information assets and means of information security threats and vulnerabilities and have made it possible implementation attacks, which in turn led to the observed damage. To solve the problem of the second phase was a model showing the links between the damage information assets and means of information security, threats and vulnerabilities. Assessing the level of information security based on the fuzzy production rules enables the decision maker make an informed judgment about the need for synthesis of control solutions for the withdrawal of security services to the specified target level, and the fuzzy cognitive model allows to synthesize the data management decisions. The technique level management of information security has been tested in several organizations in the various fields of activity. The obtained results led to the conclusion on the applicability of the proposed methodology in organizations in the various fields.
Keywords: information security, security services, threat, vulnerability, damage, protection, linguistic variable, fuzzy numbers.
Received: 05.12.2014
Revised: 12.12.2014
Document Type: Article
UDC: 004.056
Language: Russian
Citation: I. M. Azhmukhamedov, O. M. Knyazeva, “Unification of the approaches to control of the level of information security in different organizations”, Vestn. Astrakhan State Technical Univ. Ser. Management, Computer Sciences and Informatics, 2015, no. 1, 66–77
Citation in format AMSBIB
\Bibitem{AzmKny15}
\by I.~M.~Azhmukhamedov, O.~M.~Knyazeva
\paper Unification of the approaches to control of the level of information security in different organizations
\jour Vestn. Astrakhan State Technical Univ. Ser. Management, Computer Sciences and Informatics
\yr 2015
\issue 1
\pages 66--77
\mathnet{http://mi.mathnet.ru/vagtu360}
Linking options:
  • https://www.mathnet.ru/eng/vagtu360
  • https://www.mathnet.ru/eng/vagtu/y2015/i1/p66
  • This publication is cited in the following 2 articles:
    Citing articles in Google Scholar: Russian citations, English citations
    Related articles in Google Scholar: Russian articles, English articles
    Вестник Астраханского государственного технического университета. Серия: Управление, вычислительная техника и информатика
    Statistics & downloads:
    Abstract page:141
    Full-text PDF :65
    References:31
     
      Contact us:
     Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2024