Dynamic Semi-Group CIA Pattern Optimizing the Risk on RTS

The preventive control is one of the best well advance control for recent complex IS Security Application to protect the data and services from the uncertainty, hacker, and unauthorized users. Now, increasing the demand and importance of business, information & communication system & growing the external risks is a very common phenomenon for everywhere. The RTS security put forward to the management focus on IT infrastructure. This work contributes to the development of an optimization pattern that aims to determine the optimal cost to be apply into security mechanisms deciding on the measure components of system security and resources. The author's mechanism should be design in such way, the Confidentiality, Integrity, Availability, Authenticity and Accountability are automatically PDC for all the time. The author has to optimize the system attacks and down time by implementing semi-group structure CIA pattern, mean while improving the throughput of the Business, Resources & Technology. Finally, the author has to maximize the protection of IT resources & Services for all the time and every time. This proposed CIA Pattern is the part of protection, detection, benchmarking, fault analysis and risk assessment of real time operating system and applicable to efficient resource management on web application.

[1]  Jody Brazil,et al.  Security metrics to manage change , 2014, Netw. Secur..

[2]  William Stallings,et al.  Cryptography and network security , 1998 .

[3]  Jason Andress The Basics of Information Security, Second Edition: Understanding the Fundamentals of InfoSec in Theory and Practice , 2014 .

[4]  Edwin B. Heinlein Principles of information systems security , 1995, Comput. Secur..

[5]  Edgar G. Goodaire,et al.  Discrete Mathematics With Graph Theory , 1997 .

[6]  Félix Gómez Mármol,et al.  Editorial: Special issue on Identity Protection and Management , 2014, J. Inf. Secur. Appl..

[7]  Rolf Stadler,et al.  Resource Management in Clouds: Survey and Research Challenges , 2015, Journal of Network and Systems Management.

[8]  Fred Cohen,et al.  Managing network security - Part 9: Penetration testing? , 1997 .

[9]  FinneThomas Information Systems Risk Management , 2000 .

[10]  Julie D. Nosworthy A Practical Risk Analysis Approach: Managing BCM Risk , 2000, Comput. Secur..

[11]  Dario Forte,et al.  Security Audits: Security audits in mixed environments , 2009 .

[12]  Bernard Kolman,et al.  Discrete Mathematical Structures , 1984 .

[13]  Mário M. Freire,et al.  Security issues in cloud environments: a survey , 2014, International Journal of Information Security.

[14]  N. M. Sheikh Advance Computer Architecture , 2014 .

[15]  Thomas Finne,et al.  Information Systems Risk Management: Key Concepts and Business Processes , 2000, Comput. Secur..

[16]  Steve Mansfield-Devine Building in security , 2014, Netw. Secur..