Szczegóły publikacji

Opis bibliograficzny

Development of a support system for managing the cyber security of information and communication environment of transport / Valeriy Lakhno, Alexander PETROV, Anton Petrov // W: Information Systems Architecture and Technology : proceedings of 38th international conference on Information Systems Architecture and Technology – ISAT 2017 : [September 17-19, 2017, Szklarska Poręba, Poland], Pt. 2 / eds. Jerzy Świątek, Leszek Borzemski, Zofia Wilimowska. — Cham : Springer International Publishing, cop. 2018. — (Advances in Intelligent Systems and Computing ; ISSN 2194-5357 ; vol. 656). — ISBN: 978-3-319-67228-1; e-ISBN: 978-3-319-67229-8. — S. 113–127. — Bibliogr. s. 125–127, Abstr. — Publikacja dostępna online od: 2017-09-07

Autorzy (3)

Słowa kluczowe

transportinformation managementmathematical modelinformation securitydecision support system

Dane bibliometryczne

ID BaDAP109427
Data dodania do BaDAP2017-10-19
DOI10.1007/978-3-319-67229-8_11
Rok publikacji2018
Typ publikacjimateriały konferencyjne (aut.)
Otwarty dostęptak
WydawcaSpringer
KonferencjaInternational Conference on Information Systems Architecture and Technology 2017
Czasopismo/seriaAdvances in Intelligent Systems and Computing

Abstract

The operation of critical computer systems (CCS) in industry, energy, transport and communications, etc. requires constant monitoring of cyber threats, as well as vulnerabilities in the technical components and the software. The information object cyber security (CS) operational management system and the formation of the protection methods rational sets model which is based on a morphological approach is developed. This model allows us to generate different variants of protection sets that are compliant with a critical computer system (CCS) of transport branch taking into account morphological matrices for each security perimeter prepared with the intelligent decision support system (DSS or intelligent decision support system – IDSS). It will find an optimal variant of the cyber security perimeter sets using an CCS that maximizes the correlation of a consolidated figure of “information security” (IS) to consolidated figure “costs”. A program set for IDSS in circuits of organizational-technical and operational management of the CCS security system is developed. It is proven that using the developed IDSS allows us to reduce the cost of developing an information security system and to shorten the time for informing some responsible individual about information security incidents.

Publikacje, które mogą Cię zainteresować

artykuł
#111642Data dodania: 15.1.2018
Development of a support system for managing the cyber protection of an information object — Rozwój systemu wsparcia dla zarządzania cyberbezpieczeństwem obiektu / Valeriy Lakhno, Alexander PETROV, Inna Nagorna // Zeszyty Naukowe Wyższej Szkoły Humanitas. Zarządzanie ; ISSN 1899-8658. — 2017 — t. 18 nr 3, s. 147–167. — Bibliogr. s. 165–166, Abstr., Streszcz.
fragment książki
#110586Data dodania: 4.1.2018
Mobile monitoring system for environment parameters / Gerard Żmuda, Andrzej OPALIŃSKI, Mirosław GŁOWACKI // W: Information Systems Architecture and Technology : proceedings of 38th international conference on Information Systems Architecture and Technology – ISAT 2017 : [September 17-19, 2017, Szklarska Poręba, Poland], Pt. 1 / eds. Leszek Borzemski, Jerzy Świątek, Zofia Wilimowska. — Cham : Springer, cop. 2018. — (Advances in Intelligent Systems and Computing ; ISSN 2194-5357 ; vol. 655). — ISBN: 978-3-319-67219-9; e-ISBN: 978-3-319-67220-5. — S. 252–261. — Bibliogr. s. 261, Abstr. — Toż na CD. — Mirosław Głowacki – dod. afiliacja: The Jan Kochanowski University, Kielce