The software complex for the detection and evaluation of crisis situations in the information field
DOI:
https://doi.org/10.18372/2225-5036.24.13038Keywords:
crisis situation, method, system, business continuity management concept, fuzzy logic, software, interface, functional, software moduleAbstract
Ensuring the sustainable development of mankind and its safety aspects is closely related to the necessity of incidents/potential crisis situations governance. Particularly, the most significant aspect is timely identification, identification and evaluation different incident. Thus, the emergence of different information security incidents can seriously affect the business processes in enterprise, and, when a certain critical level of their influence on the information system is reached, a crisis situation is emergence. A special area of strategic management, which regulates the crisis management processes-their identification, identification, assessment, neutralization, prevention and liquidation of consequences – business continuity management dates back to the 80s of the last century. However, until recently, systems, the main functions of which were information technologies support in crisis conditions, neutralization or elimination of consequences, documentation support for the formation and implementation of business continuity plans had dominated in this sphere. And only now, attention on the procedure for early detection of crisis situations or an assessment of its destructive influence is focused. The modern crisis management systems mostly use mathematical models which based on probability theory, indicative and comparator models, and have a number of significant weaknesses. In the paper offers the software complex that implements the developed computer complex for the detection and evaluation of crisis situations in the information field, its work is based on the use of fuzzy weakly formalized models and methods using of expert approaches. Such complex allows to level out the main weakness of known similar solutions, including dependence on statistical data, speed of their processing, incompleteness and unclear initial data. In this paper describes the software implementation of the computer complex for detection and evaluation of crisis situations in the information field, its interface and functional, describes the operation modes and application features both in real time mode and for modeling various types of crisis situations.
References
EM–DAT: The OFDA/CRED International Disaster Database». Brussels, Belgium. URL: http://ww w. em–dat.net.
С.А. Петренко, А.В. Беляєв, «Управление непрерывностью бизнеса. Ваш бизнес будет продолжаться». М.: ДМК–Пресс. Компания АйТи. 2011. 400 с.
Б.Д. Альтерман, В.И. Дрожжинов, Г.Е. Моисеенко. «Обеспечение непрерывности деятельности организации в нештатных ситуаціях». Jet Info. №5(120). 2003. 28 с.
S. Harris. «CISSP Certification All–in–One Exam Guide». McGraw–Hill Osborne Media. 7th Edition. 2016. 1431 p.
А.Б. Качинський. «Безпека, загрози і ризик: наукові концепції та математичні методи». К.: Нац. акад. служби безпеки України. 2004. 471 с.
А.І. Гізун, І.Л. Лозова. «Аналіз дефініцій поняття кризова ситуація та основних аспектів концепції управління безперервністю бізнесу». Безпека інформації. Т.22. №1. 2017. С. 99-108.
А.Г. Корченко. «Построение систем защиты информации на нечетких множествах. Теория и практические решения». К.: МК–Пресс. 2006. 320 с.
М.П. Карпінський, А.О. Корченко, А.І. Гізун. «Метод виявлення інцидентів/потенційних кризових ситуацій». Захист інформації. Т.17. №2. 2015. С. 124-130.
А.О. Корченко, В.А. Козачок, А.І. Гізун. «Метод оцінки рівня критичності для систем управління кризовими ситуаціями». Захист інформації. Т.17. №1. 2015. С. 86-98.
М.П. Карпінський, А.О. Корченко, А.І. Гізун. «Інтегрована модель представлення кризових ситуацій та формалізована процедура побудови еталонів ідентифікуючих параметрів». Правове, нормативне та метрологічне забезпечення системи захисту інформації в Україні. В.1 (29). 2015. С. 76-85.
А.І. Гізун. «Обчислювальний комплекс виявлення та оцінювання кризових ситуацій в інформаційній сфері». Захист інформації. Т.18. №1. 2016. С. 66-73.
Огляд нової платформи «1С Підприємство 8.3». URL: http://erp–project.com.ua/index.php/uk/ novini/item/206–obzor–novojplatformy–1s–predpriyatie–8–3.
Downloads
How to Cite
Issue
Section
License
The scientific journal "Ukrainian Scientific Journal of Information Security" adheres to the principles of open science and provides free, free and permanent access to all published materials. The goal of the policy is to increase the visibility, citation and impact of the results of scientific research in the field of information security. The journal works according to the principles of Open Access and does not charge a fee for access to published articles.
All articles are published in Open Access under the Creative Commons Attribution 4.0 International (CC BY 4.0) license.
Copyright
Authors who publish their works in the journal “Ukrainian Scientific Journal of Information Security”:
-
retain the copyright to their publications;
-
grant the journal the right of first publication of the article;
-
agree to the distribution of their materials under the CC BY 4.0 license;
-
have the right to reuse, archive, and distribute their works (including in institutional and subject repositories), provided that proper reference is made to the original publication in the journal.