350 rub
Journal Dynamics of Complex Systems - XXI century №1 for 2015 г.
Article in number:
Formal model of information system security officer-s analytical activities
Keywords:
information system
security management
source of information
data messages
security officer
formal model
Authors:
M.Yu. Monakhov - Dr. Sc. (Eng.), Professor, Head of Department of Informatics and Information Security, Vladimir State University named after A.&N. Stoletovs. E-mail: mmonakhov@vlsu.ru
Abstract:
The object of security officer-s analytical activities is essentially the «information field» created by the components of an information system. That «field» can be accessed by the analyst as a stream of messages generated by the sources of information. According to the model proposed in this article, each state of the information system (IS) is described by a vector of quantitative and qualitative parameters in a finite-dimensional space.
Detection of «dangerous» states of IS by values of the assessable parameters is a fundamental analytical task of a security officer. Parameters of an object which allow detection of «dangerous» states are called critical. Critical parametric structure of the system (a set of critical parameters) represents the system area of (analyst-s) control.
Mathematical models presented in this article are based on the concept of descriptiveness coefficient of a critical parameter. Descrip-tiveness of a parameter characterizes its uniqueness.
This article analyzes the concept of the source of information. Sources of information construct messages that can be accessed by an observer. These messages are represented in the form of coded values of a subset of critical parameters. Characteristics of message construction and message delivery performance of a source are introduced.
Additional characteristics are used for the description of information sources and messages in the proposed model. Among these cha-racteristics are: descriptive value of a source, descriptive value of a message, completeness of a source, specificity of a message, source access time, source authorization, source response time, source mode of operation.
This article specifies the concept of source information query. It is noted that in order to effectively perform analytical activities targeted to construct regular and prompt reports, analyst has to solve associated problems, i.e. message classification by the attribution to the specific source, construction of a set of actively relevant sources, assessment and ranking of the sources by different criteria, creation of the new sources of information.
Pages: 13-17
References
- Susman G.I. Action Research: A Socio-Technical Systems Perspective / Ed. G. Morgan. London: Sage. 1983. P. 95−113.
- Monakhov M.JU., Semenova I.I., Poljanskijj D.A., Monakhov JU.M. Osobennosti sredy obespechenija dostovernosti informacii v informacionno-telekommunikacionnykh sistemakh // Fundamentalnye issledovanija. 2014. № 9 (CH. 11). S. 2403−2407.
- Monakhov Yu.M., Semenova I.I., Medvednikova M.A., Kostina N.V. Automated method of assessment of psychosemantic profile of social networks users // European Applied Sciences. 2013. № 3. P. 46−48.
- Monakhov M.JU., Semenova I.I. Kognitivnaja model ocenki urovnja dostovernosti informacii v sinteziruemojj nauchno-proizvodstvennojj dokumentacii// Sovremennye problemy nauki i obrazovanija. 2014. № 1.
- URL: http://www.science-education.ru/115-12147.
- Motylev S.A. Matematicheskaja model informacionno-analiticheskojj dejatelnosti, ispolzovannaja pri realizacii kompleksnykh informacionnykh igr (CHast 1) // Distancionnoe obrazovanie. 2000. № 4. S. 17−23.