Szczegóły publikacji
Opis bibliograficzny
Development of a support system for managing the cyber security of information and communication environment of transport / Valeriy Lakhno, Alexander PETROV, Anton Petrov // W: Information Systems Architecture and Technology : proceedings of 38th international conference on Information Systems Architecture and Technology – ISAT 2017 : [September 17-19, 2017, Szklarska Poręba, Poland], Pt. 2 / eds. Jerzy Świątek, Leszek Borzemski, Zofia Wilimowska. — Cham : Springer International Publishing, cop. 2018. — (Advances in Intelligent Systems and Computing ; ISSN 2194-5357 ; vol. 656). — ISBN: 978-3-319-67228-1; e-ISBN: 978-3-319-67229-8. — S. 113–127. — Bibliogr. s. 125–127, Abstr. — Publikacja dostępna online od: 2017-09-07
Autorzy (3)
- Lakhno Valerie A.
- AGHPetrov Oleksandr Stepanovič
- Petrov A. A.
Słowa kluczowe
Dane bibliometryczne
| ID BaDAP | 109427 |
|---|---|
| Data dodania do BaDAP | 2017-10-19 |
| DOI | 10.1007/978-3-319-67229-8_11 |
| Rok publikacji | 2018 |
| Typ publikacji | materiały konferencyjne (aut.) |
| Otwarty dostęp | |
| Wydawca | Springer |
| Konferencja | International Conference on Information Systems Architecture and Technology 2017 |
| Czasopismo/seria | Advances in Intelligent Systems and Computing |
Abstract
The operation of critical computer systems (CCS) in industry, energy, transport and communications, etc. requires constant monitoring of cyber threats, as well as vulnerabilities in the technical components and the software. The information object cyber security (CS) operational management system and the formation of the protection methods rational sets model which is based on a morphological approach is developed. This model allows us to generate different variants of protection sets that are compliant with a critical computer system (CCS) of transport branch taking into account morphological matrices for each security perimeter prepared with the intelligent decision support system (DSS or intelligent decision support system – IDSS). It will find an optimal variant of the cyber security perimeter sets using an CCS that maximizes the correlation of a consolidated figure of “information security” (IS) to consolidated figure “costs”. A program set for IDSS in circuits of organizational-technical and operational management of the CCS security system is developed. It is proven that using the developed IDSS allows us to reduce the cost of developing an information security system and to shorten the time for informing some responsible individual about information security incidents.