z-logo
open-access-imgOpen Access
Solving problems relating to ICT security management systems including various characteristics of the environment and system
Author(s) -
Dominika Dudziak-Gajowiak,
Grzegorz Kołaczek,
Krzysztof Juszczyszyn
Publication year - 2019
Publication title -
scientific journal of the military university of land forces
Language(s) - English
Resource type - Journals
eISSN - 2545-0719
pISSN - 2544-7122
DOI - 10.5604/01.3001.0013.2607
Subject(s) - computer science , information and communications technology , sherwood applied business security architecture , context (archaeology) , service (business) , security service , software security assurance , service oriented architecture , security management , process management , computer security model , knowledge management , risk analysis (engineering) , engineering management , computer security , information security , business , web service , engineering , world wide web , paleontology , marketing , biology
The work presents the essence of problems appearing in the ICT security management process in the context of systems characterized by significant dynamics of configuration and heterogeneity of resources both in the hardware and software layer. Basic differences in security management in systems with traditional centralized and monolithic architecture as well as in systems with service-oriented architecture have been presented. A layered reference model for service-oriented systems taking account of the basic goals of ICT security for dynamic information systems has been discussed. The basic assumptions of the multi-agent ICT security analysis system in service-oriented systems as well as the results of the safety analysis, including the correlation between events observed in low and high layers of the reference model have been discussed.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here