Skip to main content

Model of the Information System in the Organization for Controlling Current Level of Information Security

  • Chapter
  • First Online:
Intelligent Information and Database Systems: Recent Developments (ACIIDS 2019)

Abstract

The article outlines a concept of maintaining the required level of security of assets of the information system in the organization (ISO) by making appropriate steering decisions, initiating the generation of the security configurations. The authors proposed and formulated the models of security subject and object as well as the model of the information system in the organization for controlling current level of information security (information recourses) and current performance properties of the operation subsystems, included in the ISO.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Security configuration—a set of security mechanisms of the information processing subsystem or technical or organizational security measures of such subsystem, and relationships between them, reflecting security properties of the security configuration.

  2. 2.

    At this point, we shall not go deeper into the meaning of the word “object”, but assume the most general dictionary definition. Therefore, we treat the “object” as the “object of recognition and activities of the subject—i.e. a human”.

References

  1. Czupryński, A., Wiśniewski, B., Zboina, J.: Bezpieczeństwo. Security. Theory – Research – Practice. CNBOP-PIB, Józefów (2015) (Polish title: Bezpieczeństwo. Teoria – Badania – Praktyka)

    Google Scholar 

  2. Napiórkowski, J., Waszkowski, R.: Designing RFID-based systems for government. In: ICIM’2017 The 13th International Conference on Information Management (2017)

    Google Scholar 

  3. Piwowarski, J.: Security Studies. Elementary Issues, Scientific Monograph. University of Public and Individual Security “Apeiron” in Cracow, Cracow (2016) (Polish title: Nauki o bezpieczeństwie. Zagadnienia elementarne, Monografia naukowa)

    Google Scholar 

  4. Pokruszyński, W.: Security Theory and Practice (academic textbook). Alcide De Gasperi University of Euroregional Economy in Józefów, Józefów (2012) (Polish title: Bezpieczeństwo teoria i praktyka)

    Google Scholar 

  5. Regulation (EU) No 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation) http://www.giodo.gov.pl/pl/1520284/9745. last accessed 2016/10/30

  6. Stanik, J.: Maintaining the required level of security of the integration platform. In: Evaluation of the Usability of the Security Configuration. Newsletter of the Military University of Technology in Warsaw, LXII, No. 1, pp. 181–204, Warsaw (2013)

    Google Scholar 

  7. Stanik, J., Kiedrowicz M.: A security service model for maintaining the required level of information security in the organization. In: Simulation in Research and Development, 7(1–2), pp. 35–53, Warsaw (2018) (Polish title: Model służby bezpieczeństwa dla potrzeb utrzymywania wymaganego poziomu bezpieczeństwa informacji w organizacji)

    Google Scholar 

  8. Stanik, J., Kiedrowicz, M.: Method for assessing efficiency of the information security management system. In: CSCC 2018 22nd International Conference on Circuits, Systems, Communications and Computers (2018)

    Google Scholar 

  9. Stanik, J.: Maintenance of the required level of current functional reliability of the computer automatic control system. Dissertation, Warsaw (1987)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jarosław Napiórkowski .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Stanik, J., Kiedrowicz, M., Napiórkowski, J. (2020). Model of the Information System in the Organization for Controlling Current Level of Information Security. In: Huk, M., Maleszka, M., Szczerbicki, E. (eds) Intelligent Information and Database Systems: Recent Developments. ACIIDS 2019. Studies in Computational Intelligence, vol 830. Springer, Cham. https://doi.org/10.1007/978-3-030-14132-5_34

Download citation

Publish with us

Policies and ethics