Abstract
The widespread use of computer technology, its rapid development and use in almost all areas of human activity requires constant updating of information security issues. The activities of many enterprises in the field of IT, construction, and other areas are of a project nature and therefore further research on information security management of projects is relevant. Appearance of changes and the current state of the project results at certain points of time describe the documents that accompany it. In this paper, the information structure of the project is considered as a set of specific documents. During the life cycle of each project document, which includes the creation, transfer, preservation and transformation, there are generally threats to its confidentiality, integrity, accessibility and authenticity. This paper develops a method for assessing the risks of violation of the availability of project documents in solving information security problems. A formal description of many project documents in the form of a generalized hierarchical structure is presented, the connection of documents with the operations performed on them and information systems used during these operations is formalized. Given the incompleteness and dimension of the data, the based on fuzzy logic model was developed to assess the risk of document accessibility. Approaches to the assessment of the damage from the violation of the availability of the project document and the method of calculating the overall assessment of the risk of violation of the documents availability are proposed. The results presented in this paper can be used in decision-making processes regarding information security of projects in organizations that have project activities. The approaches proposed in this paper can serve as a basis for the creation of specialized information technologies to automate the calculation of project risk assessments.
Subject
General Earth and Planetary Sciences,General Engineering,General Environmental Science
Reference24 articles.
1. Abid H. et al.: Structuration Model of Construction Management Professionals, Use of Mobile Devices. Journal of Management in Engineering 37(4), 2021.
2. Al-Ali M. et al.: Improving risk assessment model of cyber security using fuzzy logic inference system. Computers & Security 74, 2018, 323–339.
3. Al-Ali M., Al Mogren A.: Fuzzy logic methodology for cyber security risk mitigation approach. Journal of Networking Technology 8(3), 2017.
4. Alam J. et al.: Advance Cyber Security System using fuzzy logic. Journal of Management & IT ACME 10, 2014, 17–29.
5. Azarova A.: Information Technologies and Neural Network Means for Building the Complex Goal Program Improving the Management of Intellectual Capital. Lecture Notes on Data Engineering and Communications Technologies 77, 2022, 534–547.
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献