Integrated Information Model of an Enterprise and Cybersecurity Management System: From Data to Activity

Integrated Information Model of an Enterprise and Cybersecurity Management System: From Data to Activity

Sergiy Dotsenko, Oleg Illiashenko, Vyacheslav Kharchenko, Olga Morozova
Copyright: © 2022 |Pages: 21
DOI: 10.4018/IJCWT.305860
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The paper analyzes the concepts of "data", "information", "knowledge", "intelligence", "activity", establishes their relationship in the context of integrating information about the enterprise with the contours of security management through the connection of information technologies, operation technologies, ecology technologies (IT, OT, ET). The authors propose an integrated model of information representation of the organization based on a chain of data, information, knowledge and activity / intelligence. The main feature of this model is that it explicitly includes activities that are implemented considering the laws of natural intelligence and forms a corresponding control loop. The security management system is based on identifying and tolerating threats on the stages of processing the data, information, knowledge and intelligence/activities and IT, OT and ET levels. Two industrial cases related to dialog enterprise management system and post-accident monitoring system are discussed.
Article Preview
Top

1 Introduction

The rapid development of information technology in the first two decades of the 21st century has led to a number of new challenges. Such tasks include, first of all, the tasks of security assessment, provision and management. In this case, these problems are solved for each subject area independently. There are cybersecurity, information security, functional security and other types of security that can be attributed to IT security and the so-called high security (Kharchenko, 2020; Kharchenko & Yastrebenetsky, 2020). In addition, the concept of knowledge security (Mittal et al., 2010; Zwilling et al., 2020) or knowledge-oriented security has already appeared.

The question arises whether it is possible to establish relationships between these components of security, as well as what forms of relationships can combine them?

Since the basic concepts in information technology are the concepts of “data”, “information” and “knowledge”, it is possible to assume that the very establishment of the form of relations between these concepts will ultimately ensure the establishment of the form of relations for various forms of information technology security.

The analysis of the content of basic concepts used in information technology is performed in (Dotsenko, 2020; Lancaster, 2000).

There are causal relationships between the concepts of “data”, “information” and “knowledge”. Information is data endowed with significance and goals, knowledge is the ability to turn information and data into effective actions (Drucker, 1992). On the other hand, the analysis performed in (Dotsenko, 2020; Dotsenko et al., 2019) showed that there is a dialectical connection between these concepts in the form of “general - single” (Hegel, 1969). Based on this, we hypothesize that information security has dialectically interconnected components, each of which is determined by the content of the following concepts: “data security” - “information security” - “knowledge security” - “intelligence security”.

It should be noted that the concepts of “data”, “information” and “knowledge” define only part of the properties of human mental activity. An important problem is to define the meaning of the concepts “thinking”, “intellect”, “reason”, “mind”, “meaning”, “understanding” and a number of other concepts. Thus, there is a problem of considering the content and form of relations for all the above concepts in the context of information technology security and security management.

The approach to the construction of integrated enterprise security management systems considered in previous works (Dotsenko & Fesenko, 2020; Dotsenko et al., 2019; Kharchenko et al., 2019) provided an opportunity to form a concept and develop the structure of such a system with interconnected control loops of physical IT-security, information and cyber security, functional and ecology safety at the level of technologies IT (information), OT (operation) and ET (physical environment). Therefore, the following step of research is logical, understandable and important to describe more general picture of security and safety management contours considering chains of transformation from data to knowledge, intelligence and activities.

Complete Article List

Search this Journal:
Reset
Volume 14: 1 Issue (2024)
Volume 13: 1 Issue (2023)
Volume 12: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 11: 4 Issues (2021)
Volume 10: 4 Issues (2020)
Volume 9: 4 Issues (2019)
Volume 8: 4 Issues (2018)
Volume 7: 4 Issues (2017)
Volume 6: 4 Issues (2016)
Volume 5: 4 Issues (2015)
Volume 4: 4 Issues (2014)
Volume 3: 4 Issues (2013)
Volume 2: 4 Issues (2012)
Volume 1: 4 Issues (2011)
View Complete Journal Contents Listing