Abstract
The problem of fulfilling the security requirements of computer systems within the specified range of impacts (sustainable security) is considered. A method of adaptive security management based on the logic simulation of systems has been proposed that makes it possible to detect security breaches on the set of security settings. The architecture of the automated system of adaptive security management of information systems has been presented. Software tools for strong security maintenance have been developed on its basis.
Similar content being viewed by others
References
GOST (State Standard) R ISO/MEK 27001-2006: Information Technology. Methods and Means of Ensuring Safety. Information Security Management Systems. Demands, 2006.
www.ptsecurity.ru/xs7/
Kalinin, M.O., Teoriya i sistemy upravleniya informatsionnoi bezopasnost’yu. Analiz riskov informatsionnoi bezopasnosti: Lab. Praktikum (Theory and Information Security Management System. Risk Analysis of Information Security: Laboratory Practical Work), St. Petersburg: Izd. Politekh. Univ., 2010.
Kalinin, M.O., Teoriya i sistemy upravleniya informatsionnoi bezopasnost’yu: Lab. praktikum (Theory and Information Security Management System: Laboratory Practical Work), St. Petersburg: Izd. Politekh. Univ., 2011.
Zegzhda, P.D. and Kalinin, M.O., Upravlenie bezopasnost’yu komp’yuternykh sistem (Security Management in Computer Systems), St. Petersburg: Izd. Politekh. Univ., 2012.
Author information
Authors and Affiliations
Corresponding author
Additional information
Original Russian Text © P.D. Zegzhda, M.O. Kalinin, 2015, published in Problemy Informatsionnoi Bezopasnosti. Komp’yuternye Sistemy.
About this article
Cite this article
Zegzhda, P.D., Kalinin, M.O. Automatic security management of computer systems. Aut. Control Comp. Sci. 49, 665–672 (2015). https://doi.org/10.3103/S0146411615080180
Received:
Published:
Issue Date:
DOI: https://doi.org/10.3103/S0146411615080180