Previous |  Up |  Next

Article

Title: IT/IS security management with uncertain information (English)
Author: Klimeš, Cyril
Author: Bartoš, Jiří
Language: English
Journal: Kybernetika
ISSN: 0023-5954 (print)
ISSN: 1805-949X (online)
Volume: 51
Issue: 3
Year: 2015
Pages: 408-419
Summary lang: English
.
Category: math
.
Summary: The paper introduces a novel proposal of a security management system destined primarily for application in the field of IT. Its core is formed by a triplet of cooperating knowledge-based (expert) systems, the knowledge bases of which consist of vague If-Then rules. The knowledge bases were created by experts on the problem domain and multiple times tested and verified on actual scenarios and real systems. With the system, a comprehensive methodology that is a part of a more complex approach to a decision making process is introduced. The proposed fuzzy tool is demonstrated on examples and problems from the area of information security. The paper also briefly reviews other used approaches to information security management - mainly qualitative and quantitative methodologies. (English)
Keyword: information retrieval
Keyword: fuzzy sets
Keyword: modeling information systems under uncertainty
Keyword: adaptive model
Keyword: information security
Keyword: risk management
Keyword: risk analysis
MSC: 62A10
MSC: 93E12
idZBL: Zbl 06487087
idMR: MR3391676
DOI: 10.14736/kyb-2015-3-0408
.
Date available: 2015-09-01T09:09:03Z
Last updated: 2016-04-02
Stable URL: http://hdl.handle.net/10338.dmlcz/144377
.
Reference: [1] 13335-3, ČSN ISO/IEC TR: Information technology - Guidelines for the management of IT Security - Part 3: Techniques for the management of IT Security..Český normalizační institut, Praha 1999, pp. 1-25.
Reference: [2] 27001, ČSN ISO/IEC: Information technology - Security techniques - Information security management systems - Requirements..Český normalizační institut, Praha 2006, Annex A.
Reference: [3] Bartoš, J., Procházka, J., Klimeš, C., Walek, B., Pešl, M.: Fuzzy reasoning model for decision making under uncertainty..In: 16th International Conference on Soft Computing Mendel 2010, Brno 2010.
Reference: [4] Bartoš, J., Procházka, J., Klimeš, C., Walek, B., Pešl, M.: Fuzzy reasoning model for decision making under uncertainty..In: 16th International Conference on Soft Computing Mendel 2011. Brno 2010, pp. 203-209.
Reference: [5] Bartoš, J., Walek, B.: A methodology for testing of information system under uncertainty..In: Proc. 36th International Conference on Telecommunications and Signal Processing (TSP), Faculty of Electrical Engineering and Communication, Brno University of Technology, Brno 2013, pp. 20-22. 10.1109/tsp.2013.6613883
Reference: [6] Bartoš, J., Walek, B., Smolka, P., Procházka, J., Klimeš, C.: Fuzzy modeling tools for information system testing..In: 17th International Conference on Soft Computing Mendel 2011. Brno 2011, pp. 154-161.
Reference: [7] Habiballa, H., Novák, V., Dvořák, A., Pavliska, V.: Using software package LFLC 2000..In: 2nd International Conference Aplimat, Bratislava 2003, pp. 355-358.
Reference: [8] Klimeš, C., Procházka, J.: Reasoning in Software Support and Maintenance..In: Abstracts of Contributions to 5th International Workshop on Data-Algorithm-Decision Making. DAR - UTIA 2009/3, Praha 2009.
Reference: [9] Klimeš, C.: Expert System Utilization for Modeling the Decision Making Processes upon Indetermination..Acta Electrotechnica et Informatica 1 (2007), 1.
Reference: [10] Klimeš, C., Procházka, J.: Research paper: Using LFLC for decision making in SW support and maintenance..In: Research intention DAR - OASA 2/2009. Ostrava 2009.
Reference: [11] Krutz, R. L., Vines, R. D.: The CISSP Prep Guide-Mastering the Ten Domains of Computer Security..John Wiley \and Sons, Inc., 2001, pp. 12-33.
Reference: [12] Makowski, M.: Mathematical Modeling for Coping with Uncertainty and Risk..In: System and Human Science for Safety, Security and Dependability, November 2003, pp. 1-20. 10.1016/b978-044451813-2/50004-x
Reference: [13] Novák, V.: Fuzzy množiny a jejich aplikace..SNTL, Praha 1986. Zbl 0961.94500
Reference: [14] Novák, V.: Fuzzy Relation Equations with Words. First edition..Springer,Heidelberg 2004, pp. 167-185. MR 2083023, 10.1007/978-3-540-39675-8_6
Reference: [15] Novák, V., Perfilieva, I., Močkoř, J.: Mathematical Principles of Fuzzy Logic. First edition..Kluwer Academic Publishers, Boston - Dordrecht - London 1999. MR 1733839, 10.1007/978-1-4615-5217-8
Reference: [16] Walek, B., Bartoš, J., Žáček, J.: Proposal of The Expert System for Conducting Information Security Risk Analysis, Proceedings of the International Conference on Electrical and Electronics Engineering, Clean Energy and Green Computing..In: The Society of Digital Information and Wireless Communications, 2013, pp. 58-68.
Reference: [17] Steiner, F., Tupá, J.: Management rizik v systémech řízení bezpečnosti informací..In: MOPP 2007. Západočeská univerzita, Plzeň 2007, pp. 177-183.
Reference: [18] Šegudović, H.: Quantitative risk analysis method comparison..In: MIPRO 2007 conference, ISS, pp. 1-6.
Reference: [19] Šegudović, H.: Upravljanje sigurnošću informacijskih sustava..In: KOM 2003, FER LSS, 2003, pp. III 31-40.
Reference: [20] Walek, B., Bartoš, J., Klimeš, C.: A methodology for creating a conceptual model under uncertainty..In: International Conference on Computer, Electrical, and Systems Science, and Engineering, Amsterdam 2012, pp. 86-92.
.

Files

Files Size Format View
Kybernetika_51-2015-3_3.pdf 302.5Kb application/pdf View/Open
Back to standard record
Partner of
EuDML logo