Specification of Quality Indicators for Security Event and Incident Management in the Supply Chain

The paper proposes an approach to a formalized description of the process of changing the values of quality indicators of decision support for managing security events and incidents in the supply chain. The approach is based on the analysis of the functioning processes of modern quality control systems for information security in supply chain. In addition, it is based on an analysis of decision support processes. We use controlled Markov chains, represented by difference stochastic equations. The considered version of the analytical description of the state change in dynamics allows one to formalize, structure, and mathematically describe the process of this class from a uniform perspective. It is important to note that with this representation of the dynamics of state transitions, the requirements for operativity (timeliness), reliability, secrecy and resource costs for supporting decision-making to control information security in the supply chain are taken into account.

[1]  Len LaPadula,et al.  Secure Computer Systems: A Mathematical Model , 1996 .

[2]  Mike O'Leary,et al.  Cyber Operations: Building, Defending, and Attacking Modern Computer Networks , 2015 .

[3]  Yimin Sun Research on Security Issues and Protection Strategy of Computer Network , 2015 .

[4]  Michael Moon Digital supply chains for English language learning , 2008 .

[5]  Akinori Saitoh Introduction to Computer Networks , 1992 .

[6]  S. Watts Low-Intensity Computer Network Attack and Self-Defense , 2010, Israel Yearbook on Human Rights, Volume 41 (2011).

[7]  M. Iida,et al.  Past , 1971, PS: Political Science & Politics.

[8]  Beatrice Meini,et al.  Numerical methods for structured Markov chains , 2005 .

[9]  J. Wyatt Decision support systems. , 2000, Journal of the Royal Society of Medicine.

[10]  Joseph Migga Kizza,et al.  Guide to Computer Network Security, 6th Edition , 2024, Texts in Computer Science.

[11]  Igor Kotenko,et al.  An approach to modeling the decision support process of the security event and incident management based on Markov chains , 2019 .

[12]  Igor V. Kotenko,et al.  Computer attack modeling and security evaluation based on attack graphs , 2013, 2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS).

[13]  Giovanni Vigna,et al.  STATL: An Attack Language for State-Based Intrusion Detection , 2002, J. Comput. Secur..

[14]  A. Quarteroni Mathematical Models in Science and Engineering , 2009 .

[15]  T. Dobre,et al.  Chemical engineering : modelling, simulation and similitude , 2007 .

[16]  C. Meier,et al.  Digital Supply Chain Management Agenda for the Automotive Supplier Industry , 2017 .

[17]  Mark Merkow,et al.  Information Security: Principles and Practices , 2005 .

[18]  Christer Carlsson,et al.  Past, present, and future of decision support technology , 2002, Decis. Support Syst..

[19]  Sergey V. Belim,et al.  Using the decision support algorithms combining different security policies , 2016, 2016 Dynamics of Systems, Mechanisms and Machines (Dynamics).

[20]  Petar Todorovic,et al.  Markov Processes I , 1992 .

[21]  M. Manhart,et al.  Markov Processes , 2018, Introduction to Stochastic Processes and Simulation.

[22]  Desmond J. Higham,et al.  An Algorithmic Introduction to Numerical Simulation of Stochastic Differential Equations , 2001, SIAM Rev..

[23]  T. McMillen Simulation and Inference for Stochastic Differential Equations: With R Examples , 2008 .

[24]  Igor Kotenko,et al.  Synthesis of Controlled Parameters of Cyber-Physical-Social Systems for Monitoring of Security Incidents in Conditions of Uncertainty , 2018 .

[25]  I A Shuvalov,et al.  MATHEMATICAL MODEL OF IMPACT OF THREATS ON INFORMATION SYSTEM OF PROCESSING OF PERSONAL INFORMATION , 2013 .

[26]  Olga Aksyonova,et al.  Application of a decision support system in an industrial enterprise , 2020 .

[27]  G. Fitzgerald,et al.  'I. , 2019, Australian journal of primary health.

[28]  J. van Leeuwen,et al.  Information Security , 2003, Lecture Notes in Computer Science.

[29]  Igor V. Kotenko,et al.  Design Technique for Secure Embedded Devices: Application for Creation of Integrated Cyber-Physical Security System , 2016, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..

[30]  Mark Stamp,et al.  Information security - principles and practice , 2005 .

[31]  Carlos Cid,et al.  Are We Compromised? Modelling Security Assessment Games , 2012, GameSec.

[32]  Peter Y. A. Ryan,et al.  Mathematical Models of Computer Security , 2000, FOSAD.

[33]  Jordan Stoyanov,et al.  Simulation and Inference for Stochastic Differential Equations: with R Examples , 2011 .