Basics of adaptive information security systems

Автор: Kalita Anastasia O., Ozhiganova Marina I., Tishchenko Evgeny N.

Журнал: НБИ технологии @nbi-technologies

Рубрика: Инновации в информатике, вычислительной технике и управлении

Статья в выпуске: 1 т.13, 2019 года.

Бесплатный доступ

Over the past few decades, there has been a tendency to minimize the participation of the human factor in various production and other processes. This process is implemented through the mass introduction of automated systems. Man-machine complexes are currently the most common and productive model of activity.At the current stage of technology development, the process of human activity automation is only an intermediate link on the way to excluding human intervention. This direction is the most relevant for systems that have a potential and real threat to human health and life (for example, manufacturing plants) or systems that are threatened by a person (for example, transport systems). The second group includes the sphere of information security. There is a need to move to the next level of excluding the human factor - introducing adaptive systems that will transfer the process of information protection in a completely different plane.The organization of adaptive information security systems is based on applying existing methods of adaptation from other areas of scientific knowledge in relation to information security issues. Features of such application of the generalized principles of adaptation reflect the specifics of the subject area without violating generally accepted norms.This article discusses the general principles of adaptive systems. It investigates the existing approaches to the organization of adaptive information security systems as well.

Еще

Information security, adaptive information security systems, biosystem adaptation, typical model of the adaptive information protection system, organization of information security systems

Короткий адрес: https://sciup.org/149129775

IDR: 149129775   |   DOI: 10.15688/NBIT.jvolsu.2019.1.2

Статья научная