Conceptual Model of the Efficiency of Information Security System

被引:0
|
作者
Salov, Igor, V [1 ]
Shagapov, Ildar A. [1 ]
Ismagilova, Albina S. [1 ]
机构
[1] Bashkir State Univ, Ufa, Russia
关键词
Digital systems; Information systems; Artificial intelligence; Information security system; Threats to information security;
D O I
10.1007/978-3-030-93244-2_25
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The main result of this work is a model of the effectiveness of the information security system. The authors show the feasibility of combining the reconfiguration method and the method of using different types of redundancy elements. To improve the reliability of the information security system, the authors propose to structurally separate two independent systems - the secured information system and the security system of the information system. It is necessary to use subsystems assembled on different components and running different operating systems. The use of the combination of subsystems defined in the developed approach increases the number of independent combinations of reliable subsystems. Thus, it will be possible to get different systems of information security at any given time. The proposed structure of the information security system can operate in three modes (considering impact, not considering impacts, and combined). Thus, switching between subsystems of protection is not subject to external influences. Even though the approach described in this paper will increase the complexity of the information security system, there will be an increase in the efficiency of the information security system with a slight increase in cost.
引用
收藏
页码:221 / 227
页数:7
相关论文
共 50 条
  • [31] Conceptual Model of Online Pedagogical Information Security Laboratory: Toward an Ensemble Artifact
    Iqbal, Sarfraz
    Thapa, Devinder
    Awad, Ali Ismail
    Paivarinta, Tero
    [J]. 2015 48TH HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2015, : 43 - 52
  • [32] A conceptual model of security context
    Vladimir Jovanovikj
    Dušan Gabrijelčič
    Tomaž Klobučar
    [J]. International Journal of Information Security, 2014, 13 : 571 - 581
  • [33] Why information security is a long and winding road? A conceptual framework and a contingency model
    Lin, M
    Chen, JR
    [J]. 7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL XVI, PROCEEDINGS: SYSTEMICS AND INFORMATION SYSTEMS, TECHNOLOGIES AND APPLICATION, 2003, : 53 - 58
  • [34] A conceptual model for investigating factors influencing information security culture in healthcare environment
    Hassan, Noor Hafizah
    Ismail, Zuraini
    [J]. INTERNATIONAL CONGRESS ON INTERDISCIPLINARY BUSINESS AND SOCIAL SCIENCES 2012 (ICIBSOS 2012), 2012, 65 : 1007 - 1012
  • [35] A Conceptual Model for Knowledge Sharing Towards Information Security Culture in Healthcare Organization
    Hassan, Noor Hafizah
    Ismail, Zuraini
    Maarop, Norazean
    [J]. 2013 INTERNATIONAL CONFERENCE ON RESEARCH AND INNOVATION IN INFORMATION SYSTEMS (ICRIIS), 2013, : 516 - 520
  • [36] Threat classification model for security information event management focusing on model efficiency
    Kim, Jae-yeol
    Kwon, Hyuk-Yoon
    [J]. COMPUTERS & SECURITY, 2022, 120
  • [37] Research on the conceptual model and information transfer model of intelligent building system
    Wang, Chengjun
    Liu, Hua
    [J]. 2006 XI'AN INTERNATIONAL CONFERENCE OF ARCHITECTURE AND TECHNOLOGY, PROCEEDINGS: ARCHITECTURE IN HARMONY, 2006, : 1102 - 1106
  • [38] EFFICIENCY OF AN INFORMATION-SYSTEM IN AN AGENCY MODEL
    KIM, SK
    [J]. ECONOMETRICA, 1995, 63 (01) : 89 - 102
  • [39] THE INFORMATION SOCIETY IN ROMANIA: A CONCEPTUAL MODEL OF THE SYSTEM OF INDEXES FOR EVALUATION OF THE INFORMATION SOCIETY
    Marginean, Silvia
    [J]. INTEGRATIVE RELATIONS BETWEEN THE EUROPEAN UNION INSTITUTIONS AND THE MEMBER STATES, VOL 1, 2008, : 137 - 141
  • [40] A Conceptual Hybrid Approach for Information Security Governance
    Zaydi, Mounia
    Nassereddine, Bouchaib
    [J]. INTERNATIONAL JOURNAL OF MATHEMATICS AND COMPUTER SCIENCE, 2021, 16 (01): : 47 - 66