Descriptive analysis of analogies between information security management and queuing systems
DOI:
https://doi.org/10.18372/2410-7840.19.11683Keywords:
information security risk, information security management system, queuing systems, flow of risks, descriptive analysisAbstract
It is established that none of the existing international standards contains specific methods for the development of project requirements for the information security management system applied to a particular organization for now. To overcome this limitation it is considered a possible analogy of queuing systems and information security management systems. A descriptive analysis of possible analogies is carried out by comparing the composition and the general functional model of the queuing system. On the basis of this comparison, it is established that the mathematical apparatus of the theory of queuing systems can be used to formulate project requirements for the information security management system. This will allow the development of the model of such system. It will be possible to determine sensitivity of different aspects of information security applied to a particular organization with its help.
References
Information technology. Security techniques. Infor-mation security management systems. Requirements : ISO/IEC 27001:2013. Second edition 2013-10-01. Ge-neva, P. 23, 2013.
"Понятие системы управления информационной безопасностью". [Электронный ресурс]. Режим доступа: http://globaltrust.ru/ru/uslugi/vnedrenie-sistem-upravleniya-informacionnoi-bezopasnostyu/ponyatie-sistemy-upravleniya-informacionnoi-bezopasnostyu. [Дата доступа: янва-рь 2017].
"Элементы теории массового обслуживания". [Электронный ресурс]. Режим доступа: math.immf. ru/lections/206.html. [Дата доступа: январь 2017].
"Системы массового обслуживания". [Электрон-ный ресурс]. Режим доступа: http://eos.ibi.spb.ru/ umk/11_4/5/5_R0_T6.html. [Дата доступа: январь 2017].
"Что такое Helpdesk (Service Desk)?". [Электрон-ный ресурс]. Режим доступа: http://www.helpdeski. ru/tags/helpdesk. [Дата доступа: январь 2017].
Е. Вентцель, Исследование операций: задачи, принципы, методология. М.: Издательство «Наука»: Главная ре-дакция физико-математической литературы, 1988, 132 с.
Е. Вентцель, Теория вероятностей. М.: Издательство «Наука»: Главная редакция физико-математической литературы, 1969, 515 с.
Б. Гнеденко, Введение в теорию массового обслуживания. М.: Букинист, 2012, 400 с.
Ю. Коршунов, Математические основы кибернетики. М.: Энергия, 1980, 424 с.
Information technology. Security techniques. Infor-mation security incident management. Part 1: Princi-ples of incident management: ISO/IEC 27035-1:2016. – First edition 2016-11-01. Geneva, P. 21, 2016.
В. Мохор, А. Богданов, О. Крук, В. Цуркан, "Пос-троение оценок рисков безопасности информа-ции на основе динамического множества актуальных угроз", Збірник наукових праць Інституту проблем моделювання в енергетиці ім. Г. Є. Пухова, №56, С. 87-99, 2010.
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).