Abstract
The problems of the new industry 4.0 automation paradigm are considered and the latest technologies in the field of information and communication technologies that stimulate it are analyzed, including cyber-physical systems, cloud computing, the Internet of things and big data. Some methods of multidimensional, multi-faceted industrial representation and analysis of big data are proposed. The basics of big data processing using granular computing methods have been developed. Marked the emergence of the problem of creation of special cognitive tool for constructing artificial agents, understanding integrated intelligence enterprises. In the process of information protection at the enterprise, it is proposed to optimize the information system of the enterprise and implement a protection mechanism for each part, as well as to group the risks for information in this system in a distributed information system.
First Page
64
Last Page
70
References
1. T.F.Bekmuratov “Mul'tiagentnaya gibridnaya nechetko-neyronnaya e`kspertnaya sistema informacionnoy bezopasnosti” [Multi-agent hybrid fuzzy-neural expert information security system], Problemy' informatiki i e`nergetiki vol. 3-4, pp. 3-14, 2013. (in Russian).
2. V.V.Men'shih, N.E.Spiridonova, “Ocenki vozmojnosti nesankcionirovannogo dostupa v informacionnuyu sistemu s pomosch''yu metoda analiza ierarhiy” [Assessment of the possibility of unauthorized access to the information system using the new method of hierarchy analysis], Tehnika i bezopasnost' ob`ektov ugolovno-ispolnitel'noy sistemy' : sbornik materialov mejdunarodnoy nauchno-prakticheskoy konferencii, Voronej, 2018, pp. 241-244. (in Russian).
3. V.V.Filippov, M.S.Romanov, “Sravnitel'ny'y analiz sovremenny'h integrirovanny'h sistem bezopasnosti” [Comparative analysis of modern integrated security systems], Aktual'ny'e voprosy' e`kspluatacii sistem ohrannogo monitoringa i zasch'isch'enny'h telekommunikacionny'h sistem : sbornik materialov vserossiyskoy nauchno-prakticheskoy konferencii, Voronej, 2018, pp. 87-88. (in Russian).
4. M.S.Romanov, S.A.Grechany'y, “Zadacha razrabotki matematicheskih modeley optimal'noy territorial'no raspredelennoy sistemy' centralizovannogo nablyudeniya Rosgvardii” [Task of developing a mathematical model of an optimal geographically distributed system of centralized surveillance of Resgvardii], Vestnik Voronejskogo instituta MVD Rossii, no. 2, pp. 94-101, 2018. (in Russian.)
5. M.A.Kocy'nyak, D.A.Ivanov, “Obespechenie bezopasnosti upravleniya robotizirovanny'h sistem ot vozdeystviya targetirovanny'h kiberneticheskih atak” [Ensuring the security of robotic systems management from the impact of targeted cyber attacks], Tezisy' dokladov XVI Vserossiyskoy nauchnoy konferencii «Neyrokomp'yutery' i ih primenenie», Moskva, 2018, p 108. (in Russian.)
6. T.L.Saati, “Otnositel'noe izmerenie i ego obobsch'enie v prinyatii resheniy. Pochemu parny'e sravneniya yavlyayutsya klyuchevy'mi v matematike dlya izmereniya neosyazaemy'h faktorov” Cloud Of Science, vol. 3, no. 2, pp. 171-262, 2016. (in Russian.)
7. V.A.Matveev, A.M.Morozov, R.A.Bel'fer, “Ocenka urovnya riska ugrozy' bezopasnosti froda v seti VoIP po protokolu SIP” [Assessment of risk level of fraud in the VoIP network over the SIP Protocol], E`lektrosvyaz', no. 6, pp. 35-38, 2014. (in Russian.).
8. R.A.Bel'fer, D.A.Kalyujny'y, D.V.Tarasova, “Analiz zavisimosti urovnya riska ugroz bezopasnosti setey svyazi ot e`kspertny'h danny'h pri raschetah s ispol'zovaniem teorii nechetkih mnojestv” [Analysis of the dependence of risk level of a security threat to the communication network on the expert data in calculations using the theory of fuzzy sets], Voprosy' kiberbezopasnosti, no. 1(2), pp. 61-67, 2014. (in Russian).
9. S.V.Solov'ev, V.V.Mamuta, “Primenenie apparata neyrosetevy'h tehnologiy dlya opredeleniya aktual'ny'h ugroz bezopasnosti informacii informacionny'h system” [Application of neural network technologies to determine the current level of information security information system], Naukoemkie tehnologii v kosmicheskih issledovaniyah Zemli, no. 5(8), pp. 78-81, 2016. (in Russian).
10. V.I.Vasil'ev, “Intellektual'ny'e sistemy' zasch'ity' informacii” [Dalny e intelligent information security systems], 2017. (in Russian).
11. Bekmuratov Tulkun Fayzievich, Botirov Fayzullajon Bakhtiyorovich, Haydarov Elshod Dilshod ugli, “Electronic spam filtering based on neural networks”, Сhemical technology. Control and management, no. 3(93), pp. 59-65, 2020.
Recommended Citation
Botirov, Fayzullajon Bakhtiyorovich
(2020)
"RELIABLE RISK ASSESSMENT METHOD FOR EFFECTIVE ORGANIZATION OF INFORMATION SECURITY AT ENTERPRISE,"
Chemical Technology, Control and Management: Vol. 2020:
Iss.
4, Article 10.
DOI: https://doi.org/10.34920/2020.4.64-70
Included in
Complex Fluids Commons, Controls and Control Theory Commons, Industrial Technology Commons, Process Control and Systems Commons