ON APPLICATION OF FACTORIAL ANALYSIS IN PROBLEMS OF SECURITY ESTIMATION OF AUTOMATED SYSTEMS ELEMENTS


Cite item

Full Text

Abstract

The possibility of factorial analysis application in theestimation of the state of information systems security is considered. The procedure of selection and classification of factors as well as calculation of factors influence on the resultant indicator size are described.

Full Text

Factorial analysis is one of the possible methods of automated systems security analysis. This method of analysis allows both to establish cause-and-effect relations between negative events and to characterize them quantitatively. Let’s consider the application peculiarities of a security estimation factorial model (further a factorial model) in the problem of security estimation of electronic document management system (EDMS). At the same time we will introduce universality elements into the offered model which will allow to use it for the estimation of various elements of both EDMS and other automated systems. We will especially note the applicability of the offered model and the solutions found on its basis for a human factor estimation. The model description. Let there be an information system IS which consists of N numbers of E elements, each of which in its turn consists of K components. A component of each element in a certain period of time can accept х of states s with probability r:
×

About the authors

V. V. Zolotarev

Siberian State Aerospace University named after academician M. F. Reshetnev

Russia, Krasnoyarsk

E. A. Danilova

Siberian State Aerospace University named after academician M. F. Reshetnev

Russia, Krasnoyarsk

References

  1. Волкова В. Н., Денисов А. А. Теория систем и системный анализ : учебник для вузов. М. : Юрайт, 2010.
  2. Применение факторного анализа и эволюционного алгоритма оптимизации для решения задачи управления информационными рисками систем электронного документооборота / В. Г. Жуков [и др.] // Системы управления и информационные технологии. 2009. № 3(37). С. 41–50.
  3. Беллман Р., Калаба Р. Динамическое программирование и современная теория управления. М. : Наука, 1969.
  4. Антамошкин А. Н. Алгоритм расчета прогнозируемого трафика при проектировании распределенных систем обработки и хранения информации // Вестник СибГАУ. 2006. Вып. 1. С. 5–10.
  5. Сафонов А. А. Теория экономического анализа : учеб. пособие / под ред. Л. В. Моисеевой. Владивосток : Изд-во Владивост. гос. ун-та эконом. и сервиса.
  6. ГОСТ 34.003–90. Информационная технология. Комплекс стандартов на автоматизированные системы. Автоматизированные системы. Термины и определения. М. : Изд-во стандартов, 1990.
  7. ГОСТ 27.002–89. Надежность в технике. Основные понятия. Термины и определения. М. : Изд-во стандартов, 1989.
  8. Половко А. М., Гуров С. В. Основы теории надежности. 2-е изд.. перераб. и доп. СПб. : БХВПетербург. 2006.

Supplementary files

Supplementary Files
Action
1. JATS XML

Copyright (c) 2010 Zolotarev V.V., Danilova E.A.

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

This website uses cookies

You consent to our cookies if you continue to use our website.

About Cookies