Vestnik of Astrakhan State Technical University. Series: Management, Computer Sciences and Informatics
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
General information
Latest issue
Archive
Impact factor

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



Vestn. Astrakhan State Technical Univ. Ser. Management, Computer Sciences and Informatics:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


Vestnik of Astrakhan State Technical University. Series: Management, Computer Sciences and Informatics, 2018, Number 1, Pages 71–80
DOI: https://doi.org/10.24143/2072-9502-2018-1-71-80
(Mi vagtu519)
 

COMPUTER SOFTWARE AND COMPUTING EQUIPMENT

Systematic approach to the composition of control functions in the information security systems

G. A. Popov, E. A. Popova

Astrakhan State Technical University
References:
Abstract: The paper highlights the procedure of forming the composition of management functions in the information security systems, which is based on a systematic approach. The stages of the life cycle of the threat and the realization pattern of the function have been chosen as indicators of the classification of information security functions — a priori (before the threat was manifested, i.e. responses to threats are taken on a scheduled basis), or a posteriori (after the threat had been realized, i.e. responses to threats are taken in real time). Two classes of functions are distinguished: functions ensuring the information security and functions controlling mechanisms for ensuring the information security. The research of all the dedicated functions resulted in forming a set of 22 functions. For the information security functions there were built two diagrams of possible outcomes, such as successful protection of information, breaking the security system, or its damage in the course of the function realization. The procedure of finding probabilities for the outcomes using the diagrams has been described. The efficient realization of the functions offered is more dependent on the way the functions are used and organized in the framework of an integral technology of providing information security and on the amount of the resource and financial support of these functions. Building the diagram of the outcomes helps to formalize and solve the tasks of distribution of the resources needed for increasing the level of information security. As an example there have been presented two statements of the distribution problem for improving the efficiency of realization of each of the above functions.
Keywords: information security, system approach, information protection management functions, diagram of possible outcomes, life cycle of a threat.
Received: 26.10.2017
Bibliographic databases:
Document Type: Article
UDC: 004.056.5
Language: Russian
Citation: G. A. Popov, E. A. Popova, “Systematic approach to the composition of control functions in the information security systems”, Vestn. Astrakhan State Technical Univ. Ser. Management, Computer Sciences and Informatics, 2018, no. 1, 71–80
Citation in format AMSBIB
\Bibitem{PopPop18}
\by G.~A.~Popov, E.~A.~Popova
\paper Systematic approach to the composition of control functions in the information security systems
\jour Vestn. Astrakhan State Technical Univ. Ser. Management, Computer Sciences and Informatics
\yr 2018
\issue 1
\pages 71--80
\mathnet{http://mi.mathnet.ru/vagtu519}
\crossref{https://doi.org/10.24143/2072-9502-2018-1-71-80}
\elib{https://elibrary.ru/item.asp?id=32281368}
Linking options:
  • https://www.mathnet.ru/eng/vagtu519
  • https://www.mathnet.ru/eng/vagtu/y2018/i1/p71
  • Citing articles in Google Scholar: Russian citations, English citations
    Related articles in Google Scholar: Russian articles, English articles
    Вестник Астраханского государственного технического университета. Серия: Управление, вычислительная техника и информатика
    Statistics & downloads:
    Abstract page:197
    Full-text PDF :56
    References:35
     
      Contact us:
     Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2024