Skip to main content
Log in

Automatic security management of computer systems

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract

The problem of fulfilling the security requirements of computer systems within the specified range of impacts (sustainable security) is considered. A method of adaptive security management based on the logic simulation of systems has been proposed that makes it possible to detect security breaches on the set of security settings. The architecture of the automated system of adaptive security management of information systems has been presented. Software tools for strong security maintenance have been developed on its basis.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. GOST (State Standard) R ISO/MEK 27001-2006: Information Technology. Methods and Means of Ensuring Safety. Information Security Management Systems. Demands, 2006.

  2. www.ptsecurity.ru/xs7/

  3. Kalinin, M.O., Teoriya i sistemy upravleniya informatsionnoi bezopasnost’yu. Analiz riskov informatsionnoi bezopasnosti: Lab. Praktikum (Theory and Information Security Management System. Risk Analysis of Information Security: Laboratory Practical Work), St. Petersburg: Izd. Politekh. Univ., 2010.

    Google Scholar 

  4. Kalinin, M.O., Teoriya i sistemy upravleniya informatsionnoi bezopasnost’yu: Lab. praktikum (Theory and Information Security Management System: Laboratory Practical Work), St. Petersburg: Izd. Politekh. Univ., 2011.

    Google Scholar 

  5. Zegzhda, P.D. and Kalinin, M.O., Upravlenie bezopasnost’yu komp’yuternykh sistem (Security Management in Computer Systems), St. Petersburg: Izd. Politekh. Univ., 2012.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to P. D. Zegzhda.

Additional information

Original Russian Text © P.D. Zegzhda, M.O. Kalinin, 2015, published in Problemy Informatsionnoi Bezopasnosti. Komp’yuternye Sistemy.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zegzhda, P.D., Kalinin, M.O. Automatic security management of computer systems. Aut. Control Comp. Sci. 49, 665–672 (2015). https://doi.org/10.3103/S0146411615080180

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S0146411615080180

Keywords

Navigation