Title:
|
IT/IS security management with uncertain information (English) |
Author:
|
Klimeš, Cyril |
Author:
|
Bartoš, Jiří |
Language:
|
English |
Journal:
|
Kybernetika |
ISSN:
|
0023-5954 (print) |
ISSN:
|
1805-949X (online) |
Volume:
|
51 |
Issue:
|
3 |
Year:
|
2015 |
Pages:
|
408-419 |
Summary lang:
|
English |
. |
Category:
|
math |
. |
Summary:
|
The paper introduces a novel proposal of a security management system destined primarily for application in the field of IT. Its core is formed by a triplet of cooperating knowledge-based (expert) systems, the knowledge bases of which consist of vague If-Then rules. The knowledge bases were created by experts on the problem domain and multiple times tested and verified on actual scenarios and real systems. With the system, a comprehensive methodology that is a part of a more complex approach to a decision making process is introduced. The proposed fuzzy tool is demonstrated on examples and problems from the area of information security. The paper also briefly reviews other used approaches to information security management - mainly qualitative and quantitative methodologies. (English) |
Keyword:
|
information retrieval |
Keyword:
|
fuzzy sets |
Keyword:
|
modeling information systems under uncertainty |
Keyword:
|
adaptive model |
Keyword:
|
information security |
Keyword:
|
risk management |
Keyword:
|
risk analysis |
MSC:
|
62A10 |
MSC:
|
93E12 |
idZBL:
|
Zbl 06487087 |
idMR:
|
MR3391676 |
DOI:
|
10.14736/kyb-2015-3-0408 |
. |
Date available:
|
2015-09-01T09:09:03Z |
Last updated:
|
2016-04-02 |
Stable URL:
|
http://hdl.handle.net/10338.dmlcz/144377 |
. |
Reference:
|
[1] 13335-3, ČSN ISO/IEC TR: Information technology - Guidelines for the management of IT Security - Part 3: Techniques for the management of IT Security..Český normalizační institut, Praha 1999, pp. 1-25. |
Reference:
|
[2] 27001, ČSN ISO/IEC: Information technology - Security techniques - Information security management systems - Requirements..Český normalizační institut, Praha 2006, Annex A. |
Reference:
|
[3] Bartoš, J., Procházka, J., Klimeš, C., Walek, B., Pešl, M.: Fuzzy reasoning model for decision making under uncertainty..In: 16th International Conference on Soft Computing Mendel 2010, Brno 2010. |
Reference:
|
[4] Bartoš, J., Procházka, J., Klimeš, C., Walek, B., Pešl, M.: Fuzzy reasoning model for decision making under uncertainty..In: 16th International Conference on Soft Computing Mendel 2011. Brno 2010, pp. 203-209. |
Reference:
|
[5] Bartoš, J., Walek, B.: A methodology for testing of information system under uncertainty..In: Proc. 36th International Conference on Telecommunications and Signal Processing (TSP), Faculty of Electrical Engineering and Communication, Brno University of Technology, Brno 2013, pp. 20-22. 10.1109/tsp.2013.6613883 |
Reference:
|
[6] Bartoš, J., Walek, B., Smolka, P., Procházka, J., Klimeš, C.: Fuzzy modeling tools for information system testing..In: 17th International Conference on Soft Computing Mendel 2011. Brno 2011, pp. 154-161. |
Reference:
|
[7] Habiballa, H., Novák, V., Dvořák, A., Pavliska, V.: Using software package LFLC 2000..In: 2nd International Conference Aplimat, Bratislava 2003, pp. 355-358. |
Reference:
|
[8] Klimeš, C., Procházka, J.: Reasoning in Software Support and Maintenance..In: Abstracts of Contributions to 5th International Workshop on Data-Algorithm-Decision Making. DAR - UTIA 2009/3, Praha 2009. |
Reference:
|
[9] Klimeš, C.: Expert System Utilization for Modeling the Decision Making Processes upon Indetermination..Acta Electrotechnica et Informatica 1 (2007), 1. |
Reference:
|
[10] Klimeš, C., Procházka, J.: Research paper: Using LFLC for decision making in SW support and maintenance..In: Research intention DAR - OASA 2/2009. Ostrava 2009. |
Reference:
|
[11] Krutz, R. L., Vines, R. D.: The CISSP Prep Guide-Mastering the Ten Domains of Computer Security..John Wiley \and Sons, Inc., 2001, pp. 12-33. |
Reference:
|
[12] Makowski, M.: Mathematical Modeling for Coping with Uncertainty and Risk..In: System and Human Science for Safety, Security and Dependability, November 2003, pp. 1-20. 10.1016/b978-044451813-2/50004-x |
Reference:
|
[13] Novák, V.: Fuzzy množiny a jejich aplikace..SNTL, Praha 1986. Zbl 0961.94500 |
Reference:
|
[14] Novák, V.: Fuzzy Relation Equations with Words. First edition..Springer,Heidelberg 2004, pp. 167-185. MR 2083023, 10.1007/978-3-540-39675-8_6 |
Reference:
|
[15] Novák, V., Perfilieva, I., Močkoř, J.: Mathematical Principles of Fuzzy Logic. First edition..Kluwer Academic Publishers, Boston - Dordrecht - London 1999. MR 1733839, 10.1007/978-1-4615-5217-8 |
Reference:
|
[16] Walek, B., Bartoš, J., Žáček, J.: Proposal of The Expert System for Conducting Information Security Risk Analysis, Proceedings of the International Conference on Electrical and Electronics Engineering, Clean Energy and Green Computing..In: The Society of Digital Information and Wireless Communications, 2013, pp. 58-68. |
Reference:
|
[17] Steiner, F., Tupá, J.: Management rizik v systémech řízení bezpečnosti informací..In: MOPP 2007. Západočeská univerzita, Plzeň 2007, pp. 177-183. |
Reference:
|
[18] Šegudović, H.: Quantitative risk analysis method comparison..In: MIPRO 2007 conference, ISS, pp. 1-6. |
Reference:
|
[19] Šegudović, H.: Upravljanje sigurnošću informacijskih sustava..In: KOM 2003, FER LSS, 2003, pp. III 31-40. |
Reference:
|
[20] Walek, B., Bartoš, J., Klimeš, C.: A methodology for creating a conceptual model under uncertainty..In: International Conference on Computer, Electrical, and Systems Science, and Engineering, Amsterdam 2012, pp. 86-92. |
. |