Method for complex information security management
DOI:
https://doi.org/10.18372/2225-5036.21.8740Keywords:
complex information security, method for complex information security management, information warfare, information and psychological operation, information obfuscation, complex information security systemAbstract
The functioning of any modern entity, which practice is related to the services provision or products manufacturing, concerns solving of the important task – complex information security providing. Wherein, complex information security providing is meant two tasks: information security providing or the protection of entity's information resources and the protection directed against possible information and psychological effects caused by competitors. At the article possible information security violations are considered as potentially possible conflicts, those might arise at different management levels and could be accompanied by various kinds of confrontations as elements of the hybrid war for resources gaining. The theorem is presented, which allows to formalize necessary and sufficient conditions for efficient performance of the modern enterprise as the complex protection object. The article contains the first presentation of the notion of the information obfuscation as the technology of person entanglement as a result of the special information and psychological impacts provision and it is proposed the versatile and flexible method of the complex information security management, which considers the vital activity stages peculiarities of both the protected entity and complex information protection system. The proposed method is considered to be integrated into the structure of the situational centers, which are to provide the required level of the entity protection at the scale «enterprise-region-state».References
Whitman M. Management of information
security /M. Whitman, H. Mattord. – Gengage Learning, 2010. – 592p.
Корченко А.Г. Анализ и оценивание рисков информационной безопасности / А. Г. Корченко, А.Е. Архипов, С.В. Казмирчук. – К.: ООО «Лазурит-Полиграф», 2013. – 275 с.
Дружинин В.В. Введение в теорию конфликта / В.В. Дружинин, Д.С. Конторов, М.Д. Конторов – М.: Радио и Связь, 1989. – 288 с.
Дудатьєв А.В. Теоретичні аспекти та технології керованого хаосу для реалізації комплексного інформаційного захисту соціотехнічних систем / А.В. Дудатьєв // Інформаційні технології та комп’ютерна інженерія. – 2014. – № 2(30). – С.28-32.
Дудатьєв А.В. Розробка уніфікованих моделей системного проектування оптимальних систем захисту інформаційних ресурсів / А.В. Дудатьєв // Вісник Черкаського технологічного університету. – 2008. – №1. – С. 3-8.
Джордж М.Л. Бережливое производство шесть сигм в сфере услуг / М.: Л. Джордж. – М.: Альпина Бизнес Букс, 2005. – 402 с.