3-12
Method of Building a Goal Tree in a System-Conceptual Approach to Information Security
Authors: Georgi A. Popov, Simon Zh. Simavoryan, Arsen R. Simonyan, Elena I. Ulitina
Number of views: 248
The task of improving the quality of results in the design, construction and improvement of complex structures has always been one of the key positions in the process of creation and operation of systems of various purposes. Especially those characterized by a large structural structure, a significant territorial distribution and a complex technological structure. Research based on both a system-conceptual approach and system analysis is widely used to ensuring information security (EIS) challenges. However, the lack of comparative analysis of the advantages of using these methods in solving the various problems of the OIB requires its current and timely solution, which is the subject of research.
The methodology of the study is based on a system-conceptual approach and system analysis using modeling, generalization, comparison, analysis, synthesis and algorithms. A procedure has been developed to converge initial poorly formalized and poorly structured tasks in the field of EIS to a set of separate well-structured tasks based on the method of building a goal tree according to the method of V.N. Sagatovsky.
The task of developing a method (procedure) of building a goal tree within the framework of a system-conceptual approach has been set and solved. A new procedure for building the target tree of interest has been proposed, which includes five steps to detail the original goal of the EIS domain, namely: 1) the global goal (or goals); 2) end results; 3) components of the EIS system; 4) control cycle (functions); 5) work plans and schedules. For the first time, a comparative analysis of the possibilities of using systems analysis methods and a system-conceptual approach in EIS systems was carried out. It has been shown that a system-conceptual approach is generally preferable when there is a large set of constraints combined by existing technology of operation of the EIS system.