Abstract. Risk is an inherent part of the functioning of every organization therefore the risk management should be a natural activity at each level of management. A common mistake in the management process of an organization is separating the security system, including the risk management system, and treating it as an isolated element. The article presents the place and role of the risk management system in the context of safety of the IT resource of an organization. A model of the risk management system was developed as the basic element of the organization management system and function supporting the continued operation in terms of IT safety of modern organizations.
Abstract. The article discusses the problem of risk management in the context of safety of an organization's information assets. Assuming system of information risk management as a basic element of organization management in the aspect of information safety of modern organizations, this document focuses on methods and techniques of qualitative risk estimates. Basic standards and good practice from areas of risk management and ensuring information safety in the organization were recalled.
Abstract. The deliberations presented in this study refer to the method for assessing software reliability of the document management system, using the RFID technology. A method for determining the reliability structure of the discussed software, understood as the index vector for assessing reliability of its components, was proposed. The model of the analyzed software is the control transfer graph, in which the probability of activating individual components during the system's operation results from the so-called operational profile, which characterizes the actual working environment. The reliability structure is established as a result of the solution of a specific mathematical software task. The knowledge of the reliability structure of the software makes it possible to properly plan the time and financial expenses necessary to build the software, which would meet the reliability requirements. The application of the presented method is illustrated by the number example, corresponding to the software reality of the RFID document management system.
Abstract. The study outlines the method for examining the properties of the RFID-tagged document management system. The system is composed of computers, where the software for supporting processes of the RFID-tagged documents was installed. Furthermore, the system cooperates with many other elements of the secret office (cabinets, sluices, photocopiers, desks). The examination of the properties of the RFID-tagged document management system is, in this case, complex due to the number of a possible examination scenarios. The simulation method for examining the system properties was proposed. It allows to conduct the examination of the properties in a short period of time for numerous testing scenarios.
Abstract. The paper presents models of data flow between tasks in business processes describing work of a modern restricted access administrative office. The presented models are the result of the analytical work performed by the multidisciplinary team of experts. The team was composed of IT specialist, security systems specialists and employees of the secret office. Business process diagrams and data flow diagrams are presented together to emphasize the importance of data in every business process task to be performed -despite the fact if it is an automated or human task.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.