scholarly journals The development of models of an analytical data processing system for monitoring information security of an informatization object using cloud infrastructure

Author(s):  
V. A. Sizov ◽  
A. D. Kirov

The article is devoted to the problem of developing an analytical data processing system for monitoring information security within the information security management system of modern companies conducting their main activities in cyberspace and using cloud infrastructure. Based on the analysis of modern information technologies related to ensuring information security of cloud infrastructure and the most popular products for ensuring information security of cloud infrastructures, as well as existing scientific approaches, a formalized approach to the synthesis of an analytical data processing system for monitoring the information security of an informatization object using cloud infrastructure is proposed. This approach takes into account the usefulness of the used information technologies from the viewpoint of information security. A general model of the structure of information support of an analytical data processing system for monitoring information security, as well as a model of the dependence of the usefulness of information technology on time and the ratio of the skill level of an information security specialist and an attacker are presented. The quality of the information security monitoring system is used as a criterion in the first optimization model. The following limitations are suggested: limitation on the time of making a decision on an incident; limitation on the degree of quality of analysis of information security events by the analytical data processing system and limitation on the compatibility of data analysis functions with data types about information security events. The cited results of the study of the second model show a logically consistent dependence of the usefulness of information technology on time and the ratio of the skill level of an information security specialist to the skill level of an attacker. The particular models of the structure of the information support of ASOD are presented. They make it possible to determine the rational structure information support of ASOD according to particular criteria. The following particular criteria are used: the maximin criterion of the usefulness of the information support of ASOD for monitoring the information security of an informatization object in the cloud infrastructure; the criterion for the maximum relevance of information support distributed over the nodes of the cloud infrastructure for systems with a low degree of centralization of management.

Author(s):  
Nellya Nagimovna Mustafaeva ◽  
Oksana Mikhailovna Knyazeva

The article presents the method "Inspector" to be adapted for assessment of the levels of quality of data processing systems in universities. Included into the methodology fuzzy cognitive models of determining the required, estimating the current and "forecasted" levels of quality of data processing systems, as well as corresponding algorithms allow evaluating the system at the design stage and operation stage on the basis of expert information. Using the complex criterion of quality assessment makes it possible to increase the informativeness of the assessment, which, in turn, increases the efficiency of quality of data processing systems. Adapting methodology to the peculiarities of functioning of universities includes defining the main functions of the evaluated data processing systems; defining the elements of the sets of concepts of fuzzy cognitive models used in the methodology; verifying the existence of links between concepts of fuzzy cognitive models; filling the knowledge base necessary to assess the current level of information security of the data processing system. The methodology was approved in one of the leading higher educational institutions of the Volga region for assessment of the data processing system "Deccan". To adapt the methodology and directly assess the quality and information security of the data processing system, an expert commission was assembled, consisting of IT staff of the university, professors of profile departments of the university, employees of the dean's office. The work of the commission was organized through meetings. Discussion of each issue lasted until the experts made an agreed decision. According to the data obtained after application of the methodology, there were taken measures to elevate quality of the Deccan system to the level "above average". Approbation of the method "Inspector" showed its applicability for assessing the quality of data processing systems of universities.


1974 ◽  
Vol 13 (03) ◽  
pp. 125-140 ◽  
Author(s):  
Ch. Mellner ◽  
H. Selajstder ◽  
J. Wolodakski

The paper gives a report on the Karolinska Hospital Information System in three parts.In part I, the information problems in health care delivery are discussed and the approach to systems design at the Karolinska Hospital is reported, contrasted, with the traditional approach.In part II, the data base and the data processing system, named T1—J 5, are described.In part III, the applications of the data base and the data processing system are illustrated by a broad description of the contents and rise of the patient data base at the Karolinska Hospital.


2010 ◽  
Vol 24 (6) ◽  
pp. 569-573
Author(s):  
Changhai Zhao ◽  
Qiuhua Wan ◽  
Shujie Wang ◽  
Xinran Lu

2018 ◽  
Vol 4 (1) ◽  
pp. 87-96
Author(s):  
Yanni Suherman

Research conducted at the Office of Archives and Library of Padang Pariaman Regency aims to find out the data processing system library and data archiving. All data processing is done is still very manual by using the document in writing and there is also a stacking of archives on the service. By utilizing library information systems and archives that will be applied to the Office of Archives and Library of Padang Pariaman Regency can improve the quality of service that has not been optimal. This research was made by using System Development Life Cycle (SDLC) which is better known as waterfall method. The first step taken on this method is to go directly to the field by conducting interviews and discussions. This information system will be able to assist the work of officers in terms of data processing libraries and facilitate in search data archives by presenting reports more accurate, effective and efficient.


Sign in / Sign up

Export Citation Format

Share Document