MODELS OF INFOMATIONAL DECISION SUPPORT FOR THE COMPLEX INFORMATION SECURITY MANAGMENT

A. V. Dudatyev, O. P. Voitovych

Abstract


Context. The existence of a competitive information environment, which is a specific arena for special information operations, shows
the necessity for implemention of information resources complex protection. Information warfare and the problems, those arise in the field of complex information security management, determine the relevance of the information decision support models development, as well as the creation of situational or information-analytical centers of the complex information security at the «Enterprise – Region – State»
management levels.
Objective. The goal of this research is a development of information decision support model of the complex information security
management of the multi-level socio-technical system which is consists of the individual objects, groups of objects (region) and the State en
block, which would provide security level quantitative indicators as well as the ability to make decisions for the complex information security
at the «Enterprise – Region – State» levels management.
Method. The method of this research is based on the idea that the State protection level depends on the subordinate regions protection
level, which in its turn, depends on the subordinate local objects (enterprise) protection level. The enterprise protection level depends on the violation of at least one of the criteria: integrity, availability, confidentiality.
Results. The task of developing of the generalized model for complex information security of the multi-level socio-technical system
evaluation in terms of «Enterprise – Region – State» is solved, which allows obtaining an protection level estimation of the both local
(enterprise) and integrated (region and the State) objects. The probabilistic or expert evaluations in the form of fuzzy sets can be used for base threat occurrence estimation. The structural model of multi-level information-analytic center of the complex information security management is proposed. The results of researching have shown the possibility of using this approach for estimation and management problem solution of information security management for complex information security of the multi-level socio-technical systems.
Conclusions. Scientific novelty of the research is in the fact that the complex information security at the «Enterprise – Region – State»
management levels evaluation model is proposed for the first time.
Practical significance consists in the development of the software implemented the process of complex information security of the multilevel socio-technical systems evaluation in terms of «Enterprise – Region – State» analyzing and estimation, as well as the synthesis of
management decisions based on the generated knowledge bases.

Keywords


sociotechnical system; complex information security; information warfare; special informational operations; informationalanalytic center; decision support.

References


Ситуационные центры в решении проблем информационной безопасности [Електронний ресурс] – Режим доступу до ресурсу: http://www.itsec.ru/articles2/Inf_security/sit_cents [Назва з екрану]. 2. Президент ввів у дію рішення РНБО про Головний ситуаційний центр [Електронний ресурс] – Режим доступу до ресурсу: http://www.ukrinform.ua/rubric-iac/1820573- poroshenko_vviv_u_diyu [Назва з екрану]. 3. Корченко А. Г. Системы анализа и оценивания рисков информационной безопасности: монография / А. Г. Корченко, А. Е. Архипов, С. В. Казмирчук. – Издательский Дом Palmarium Academic Publishing, 2013. – 316 с. 4. Ильин Н. И. Ситуационные центры. Опыт, состояние, тенденции развития / Н. И. Ильин, Н. Н. Демидов, Е. В. Новикова. – М. : Медиа Пресс, 2011. – 336 с. 5. Simola J. Common Cyber Situational Awareness: An Important Part of Modern Public Protection and Disaster Relief / J. Simola, J. Rajam ki // Proceedings of the 10th International Conference on Computer Engineering and Applications (CEA’16), Barcelona. – 2016. 6. A streaming-based network monitoring and threat detection system / [Z. Chen, H. Zhang, W. Hatcher, etc]. // Software Engineering Research Management and Applications (SERA) 2016 IEEE 14th International Conference on. – 2016. – С. 31–37. 7. A cloud computing based architecture for cyber security situation awareness / [YU, Wei, et al.]. // Communications and Network Security (CNS), 2013 IEEE Conference on. IEEE. – 2013. – P. 488–492. 8. Рябинин И. А. Надежность и безопасность структурно-сложных систем / И. А. Рябинин. – СПб.: Политехника, 2000. – 248 с. 9. Дудатьєв А. В. Розробка уніфікованих моделей системного проектування оптимальних систем захисту інформаційних ре- сурсів / А. В. Дудатьєв // Вісник Черкаського технологічного університету. – 2008. – № 1. – С. 3–8. 10. Дудатьев А. В. Метод оценки информационной устойчивости социотехнических систем в условиях информационной войны / А. В. Дудатьєв, В. А Лужецкий, Д. А. Коротаев // Восточно-Европейский журнал передовых технологий. – 2016. – № 1. – С. 4–11.


GOST Style Citations






DOI: http://dx.doi.org/10.15588/1607-3274-2017-1-13



Copyright (c) 2017 A. V. Dudatyev, O. P. Voitovych

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

Address of the journal editorial office:
Editorial office of the journal «Radio Electronics, Computer Science, Control»,
Zaporizhzhya National Technical University, 
Zhukovskiy street, 64, Zaporizhzhya, 69063, Ukraine. 
Telephone: +38-061-769-82-96 – the Editing and Publishing Department.
E-mail: rvv@zntu.edu.ua

The reference to the journal is obligatory in the cases of complete or partial use of its materials.