Skip to main content

2015 | OriginalPaper | Buchkapitel

Analysis of Objective Trees in Security Management of Distributed Computer Networks of Enterprises and Organizations

verfasst von : Olga Dolinina, Vadim Kushnikov, Ekaterina Kulakova

Erschienen in: Computer Networks

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The paper contains the formulation of the problem of situational safety management of distributed computer networks, mathematical models and algorithms, which can help to identify quickly and eliminate the causes of security breaches of these networks during their operation. The developed software allows to create a methodological basis for the creation of new information security management systems with cognitive functions, the use of which will improve the reliability and efficiency of the enterprises and organizations.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Spafford, E.H.: Cyber security: assessing our vulnerabilities and developing an effective defense. In: Gal, C.S., Kantor, P.B., Lesk, M.E. (eds.) ISIPS 2008. LNCS, vol. 5661, pp. 20–33. Springer, Heidelberg (2009) CrossRef Spafford, E.H.: Cyber security: assessing our vulnerabilities and developing an effective defense. In: Gal, C.S., Kantor, P.B., Lesk, M.E. (eds.) ISIPS 2008. LNCS, vol. 5661, pp. 20–33. Springer, Heidelberg (2009) CrossRef
2.
Zurück zum Zitat BS 7799–1: 2005. Information security management. Code of practice for information security management BS 7799–1: 2005. Information security management. Code of practice for information security management
3.
Zurück zum Zitat BS 7799–2: 2005. Information security management. Specification for information security management systems BS 7799–2: 2005. Information security management. Specification for information security management systems
4.
Zurück zum Zitat BS 7799–3: 2006. Information security management systems. Guidelines for information security risk management BS 7799–3: 2006. Information security management systems. Guidelines for information security risk management
5.
Zurück zum Zitat BS 7799–3: 2006. Information security management systems - Part 3: Guidelines for information security risk management BS 7799–3: 2006. Information security management systems - Part 3: Guidelines for information security risk management
6.
Zurück zum Zitat Information Security Management Handbook. 5th edn. CRC Press (2004) Information Security Management Handbook. 5th edn. CRC Press (2004)
7.
Zurück zum Zitat ISO/IEC TR 13335–3: 1998. Information technology - Guidelines for the management of IT Security - Part 3: Techniques for the management of IT security ISO/IEC TR 13335–3: 1998. Information technology - Guidelines for the management of IT Security - Part 3: Techniques for the management of IT security
8.
Zurück zum Zitat Risk Management Guide for Information Technology Systems. Recommendations of the National Institute of Standards and Technology. Special Publication 800–30 (2002) Risk Management Guide for Information Technology Systems. Recommendations of the National Institute of Standards and Technology. Special Publication 800–30 (2002)
9.
Zurück zum Zitat GOST R (Russian National Standard) ISO/IEC TR 18044. Information technology. Security techniques. Information security management GOST R (Russian National Standard) ISO/IEC TR 18044. Information technology. Security techniques. Information security management
10.
Zurück zum Zitat GOST R (Russian National Standard) ISO/IEC 18045. Information technology. Security techniques. Methodology for IT security evaluation GOST R (Russian National Standard) ISO/IEC 18045. Information technology. Security techniques. Methodology for IT security evaluation
11.
Zurück zum Zitat GOST R (Russian National Standard) 50922–2006. Protection of information. Basic terms and definitions GOST R (Russian National Standard) 50922–2006. Protection of information. Basic terms and definitions
12.
Zurück zum Zitat Vasil’ev, S.N.: From the classic problems of regulation to intelligent control I: bulletin of the Russian academy of sciences. Theor. Manage. Syst. 1, 5–22 (2001). Science Publishers, Moscow Vasil’ev, S.N.: From the classic problems of regulation to intelligent control I: bulletin of the Russian academy of sciences. Theor. Manage. Syst. 1, 5–22 (2001). Science Publishers, Moscow
13.
Zurück zum Zitat Rezchikov, A.F., Kushnikov, V.A., Shlychkov, E.I., Boikova, O.M.: Models and algorithms of problem definition of ACS development by industrial facilities: devices and systems. Manage. Control Diagn. 9, 64–68 (2006). NauchTekhLitIzdat, Moscow Rezchikov, A.F., Kushnikov, V.A., Shlychkov, E.I., Boikova, O.M.: Models and algorithms of problem definition of ACS development by industrial facilities: devices and systems. Manage. Control Diagn. 9, 64–68 (2006). NauchTekhLitIzdat, Moscow
14.
Zurück zum Zitat Shlychkov, E.I., Pohaznikov, M.Y., Kushnikov, V.A., Kalashnikov, O.M.: Feasibility analysis of activity plans under the operational management in a machine-building enterprise. Bull. Yuri Gagarin State Tech. Univ Saratov 1(1), 88–95 (2007). SSTU, Saratov Shlychkov, E.I., Pohaznikov, M.Y., Kushnikov, V.A., Kalashnikov, O.M.: Feasibility analysis of activity plans under the operational management in a machine-building enterprise. Bull. Yuri Gagarin State Tech. Univ Saratov 1(1), 88–95 (2007). SSTU, Saratov
15.
Zurück zum Zitat Avetisjan, J.A., Kushnikov, V.A., Rezchikov, A.F., Rodichev, V.A.: Mathematical models and algorithms for operative administration of processes dealing with elimination of emergencies. Mechatron. Autom. Control 11, 43–47 (2009). New Technologies, Moscow Avetisjan, J.A., Kushnikov, V.A., Rezchikov, A.F., Rodichev, V.A.: Mathematical models and algorithms for operative administration of processes dealing with elimination of emergencies. Mechatron. Autom. Control 11, 43–47 (2009). New Technologies, Moscow
16.
Zurück zum Zitat Kushnikov, V.A., Rezchikov, A.F., Tsvirkun, A.D.: Control in man-machine systems with automated correction of objectives. Meitan Kexun Jishu 26, 168–175 (1998). Coal Science and Technology, Peking Kushnikov, V.A., Rezchikov, A.F., Tsvirkun, A.D.: Control in man-machine systems with automated correction of objectives. Meitan Kexun Jishu 26, 168–175 (1998). Coal Science and Technology, Peking
17.
Zurück zum Zitat Drucker, P.F.: Management: Tasks Responsibilities Practices. HaperCollins Publishers, New York (1993) Drucker, P.F.: Management: Tasks Responsibilities Practices. HaperCollins Publishers, New York (1993)
18.
Zurück zum Zitat Anderson, J.A.: Discrete Mathematics with Combinatorics. Prentice Hall, New Jersey (2003) Anderson, J.A.: Discrete Mathematics with Combinatorics. Prentice Hall, New Jersey (2003)
Metadaten
Titel
Analysis of Objective Trees in Security Management of Distributed Computer Networks of Enterprises and Organizations
verfasst von
Olga Dolinina
Vadim Kushnikov
Ekaterina Kulakova
Copyright-Jahr
2015
DOI
https://doi.org/10.1007/978-3-319-19419-6_11

Premium Partner