z-logo
open-access-imgOpen Access
PROCEDURAL BASIS OF CYBERSECURITY SYSTEMS
Author(s) -
Oleksandr Milov,
Stanislav Milevskyi,
Serhii Pohasii,
Khazail Rzayev
Publication year - 2019
Publication title -
sistemi upravlìnnâ, navìgacìï ta zvʼâzku
Language(s) - English
Resource type - Journals
ISSN - 2073-7394
DOI - 10.26906/sunz.2019.5.072
Subject(s) - computer science , business process reengineering , process (computing) , software engineering , presentation (obstetrics) , business process , security testing , formal methods , computer security , security information and event management , work in process , cloud computing security , cloud computing , engineering , medicine , operations management , lean manufacturing , radiology , operating system
The subject of the research is a system of procedures implemented within the framework of a cybersecurity system, which is analyzed and described in a formal form. The aim of this work is to develop a formal description of the system of procedures implemented within the security system, which would automate the analysis, adaptation and design of the entire complex of processes operating within the cybersecurity system. The technique is based on the use of set theory, as well as system and process analysis. The tasks that need to be solved are to analyze existing approaches to the analysis of ongoing processes to identify their advantages and disadvantages. Based on the analysis, to propose a new formal presentation and classification of security system processes. The following results were obtained: the general characteristics of the security system processes were identified, the information and model bases of the security system were formed, which made it possible to present an approach to the classification and formal presentation of procedures implemented in security systems. Conclusion: The approach to the classification and the formal description of the procedures implemented in the security system presented in the article allows us to formalize the approach to the analysis and subsequent synthesis of the necessary procedural basis for the design and reengineering of security systems, in a more understandable way to the decision-maker. Thus, the efficiency of managing the mechanisms for protecting the contour of business processes is increased.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here