Analysis and security management of telecommunication systems based on predictive technologies
DOI:
https://doi.org/10.18372/2310-5461.39.13087Keywords:
information security, integrated security, cognitive modeling, telecommunication system.Abstract
This paper presents the peculiarities of providing information, taking into account the subjective aspect of this process. The main purpose of the study is to develop an algorithm for analyzing and managing integrated security, which will unify the approaches to information security management. Security does not exist by itself, in isolation from a person. It is provided for a person and it is appreciated. Therefore, the notion of security has not only an objective but also a subjective aspect, since the assessment of its level is ultimately man. Using cognitive modeling methods can greatly improve the analysis and management of the security of the telecommunication system. The advantages of the cognitive approach are the ability to simulate poorly structured (poorly formalized) systems that are characterized by incomplete or uncertain knowledge of them. The application of the developed algorithm will allow the specialists to begin to develop appropriate computational procedures and modules, which can be further used in telecommunication system security. The results of the research will be useful for information security specialists.References
Haydamakin N. Concurrent access to information in computer systems — E. : Ural, 2003. — 328 p.
Zegjda D. Fundamentals of Information System’s Security. — М. : Telecom, 2000. — 286 p.
Devianin P. Computer systems security models — М. : Akademia, 2005. — 144 p.
Kort S. Theoretical fundamentals of information security. — М. : Gelios, 2004. — 240 p.
Kurilo А. Information security audit. — М. : BDC-press, 2006. — 304 p.
SaderdinovА. Information security / — М. : Dashkovka, 2005. — 336 p.
Petrenko S. Information Risk Management. Economically justified security. — М. : Press, 2005. — 384 p.
Borisov V. Fuzzy models and networks. — М. : Telecom, 2007. — 284 p.
Raykov A. Intelligent Information Technolo-gies. — М. :.MGIREA, 2000. — 96 p.
Vasiliev V. Analysis and management of information security of colleges on the basis of cognitive modeling. — 2007. — № 1, Т. 27. — P. 74–81.
Ajmuhamedov I. Management of information security in the region based on cognitive modeling. — 2010. — № 1. — P. 96–102.
Ajmuhamedov I. Modeling based on expert judgments of the evaluation process of information security. — 2009. — № 2. — P. 101–109.