Managing the Process of Ensuring Information Security based on the Law of «Preserving the Integrity of the Object»
Daria A. Ukraintseva, Vyacheslav Burlov, Vitaly Gryzunov
2021
Abstract
Information security management requires forming processes with predefined properties. However, analysis based models are usually used for management. This requires solving a direct management problem. And its solution does not allow us to fully meet the formulated requirements. The article presents a management concept based on synthesis, which already allows us to meet these requirements more fully. The new approach is based on solving the inverse control problem. The solution of the inverse control problem allows you to create conditions for the application of methods and models of program-target control. The result is the creation of a mathematical model of managerial decisions. The concept of synthesis-based management is presented.
DownloadPaper Citation
in Bibtex Style
@conference{infsec21,
author={Daria A. Ukraintseva and Vyacheslav Burlov and Vitaly Gryzunov},
title={Managing the Process of Ensuring Information Security based on the Law of «Preserving the Integrity of the Object»},
booktitle={Proceedings of the International Scientific and Practical Conference on Computer and Information Security - Volume 1: INFSEC,},
year={2021},
pages={116-121},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0010619500003170},
isbn={978-989-758-531-9},
}
in EndNote Style
TY - CONF
JO - Proceedings of the International Scientific and Practical Conference on Computer and Information Security - Volume 1: INFSEC,
TI - Managing the Process of Ensuring Information Security based on the Law of «Preserving the Integrity of the Object»
SN - 978-989-758-531-9
AU - A. Ukraintseva D.
AU - Burlov V.
AU - Gryzunov V.
PY - 2021
SP - 116
EP - 121
DO - 10.5220/0010619500003170
in Harvard Style
A. Ukraintseva D., Burlov V. and Gryzunov V. (2021). Managing the Process of Ensuring Information Security based on the Law of «Preserving the Integrity of the Object». In Proceedings of the International Scientific and Practical Conference on Computer and Information Security - Volume 1: INFSEC, ISBN 978-989-758-531-9, pages 116-121. DOI: 10.5220/0010619500003170