Development of a Support System for Managing the Cyber Security of Information and Communication Environment of Transport

被引:2
|
作者
Lakhno, Valeriy [1 ]
Petrov, Alexander [2 ]
Petrov, Anton [3 ]
机构
[1] European Univ, Kiev, Ukraine
[2] AGH Univ Sci & Technol, Krakow, Poland
[3] Natl Aviat Univ, Kiev, Ukraine
关键词
Information security; Information management; Transport; Decision support system; Mathematical model;
D O I
10.1007/978-3-319-67229-8_11
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The operation of critical computer systems (CCS) in industry, energy, transport and communications, etc. requires constant monitoring of cyber threats, as well as vulnerabilities in the technical components and the software. The information object cyber security (CS) operational management system and the formation of the protection methods rational sets model which is based on a morphological approach is developed. This model allows us to generate different variants of protection sets that are compliant with a critical computer system (CCS) of transport branch taking into account morphological matrices for each security perimeter prepared with the intelligent decision support system (DSS or intelligent decision support system - IDSS). It will find an optimal variant of the cyber security perimeter sets using an CCS that maximizes the correlation of a consolidated figure of "information security" (IS) to consolidated figure "costs". A program set for IDSS in circuits of organizational-technical and operational management of the CCS security system is developed. It is proven that using the developed IDSS allows us to reduce the cost of developing an information security system and to shorten the time for informing some responsible individual about information security incidents.
引用
收藏
页码:113 / 127
页数:15
相关论文
共 50 条
  • [1] Development of cyber information security education and training system
    Bong-Hyun Kim
    Ki-Chan Kim
    Sung-Eon Hong
    Sang-Young Oh
    [J]. Multimedia Tools and Applications, 2017, 76 : 6051 - 6064
  • [2] Development of cyber information security education and training system
    Kim, Bong-Hyun
    Kim, Ki-Chan
    Hong, Sung-Eon
    Oh, Sang-Young
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (04) : 6051 - 6064
  • [3] Managing Information Technology Security in the Context of Cyber Crime Trends
    Neghina, D.
    Scarlat, E.
    [J]. INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2013, 8 (01) : 97 - 104
  • [4] Managing information system security.
    Warren, L
    [J]. SYSTEMS RESEARCH AND BEHAVIORAL SCIENCE, 1997, 14 (06) : 428 - 429
  • [5] Agile Development for System of Systems: Cyber Security Integration into Information Repositories Architecture
    Farroha, Deborah L.
    Farroha, Bassam S.
    [J]. 2011 IEEE INTERNATIONAL SYSTEMS CONFERENCE (SYSCON 2011), 2011, : 182 - 188
  • [6] INFORMATION SECURITY MANAGEMENT SYSTEM AND CYBER SECURITY IN THE CZECH REPUBLIC
    Drastich, Martin
    [J]. ZNALOSTI PRO TRZNI PRAXI 2015: ZENY - PODNIKATELKY V MINULOSTI A SOUCASNOSTI, 2015, : 85 - 90
  • [7] Managing Information Security Outsourcing in a Dynamic Cooperation Environment
    Wu, Yong
    Tayi, Giri Kumar
    Feng, Genzhong
    Fung, Richard Y. K.
    [J]. JOURNAL OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2021, 22 (03): : 827 - 850
  • [8] Cyber Security Infrastructure of Smart Grid Communication System
    Miao, Xin
    Chen, Xi
    [J]. 2012 CHINA INTERNATIONAL CONFERENCE ON ELECTRICITY DISTRIBUTION (CICED), 2012,
  • [9] Development of automated communication of system for managing site information using internet technology
    Dawood, N
    Akinsola, A
    Hobbs, B
    [J]. AUTOMATION IN CONSTRUCTION, 2002, 11 (05) : 557 - 572
  • [10] Information Security and System Development
    Stoll, Margareth
    Laner, Dietmar
    [J]. NOVEL ALGORITHMS AND TECHNIQUES IN TELECOMMUNICATIONS AND NETWORKING, 2010, : 35 - 40