International Journal of Engineering and Advanced Technology (IJEAT)
ISSN: 2249 – 8958, Volume-8 Issue-6, August 2019
4526
Published By:
Blue Eyes Intelligence Engineering
& Sciences Publication
Retrieval Number F8842088619/2019©BEIESP
DOI: 10.35940/ijeat.F8842.088619
Abstract: The rapid development of information technology has
strengthened the importance of the information risk management
system. Integrated systems for storing and processing information,
its transmission channels, as well as the information itself, are
strategically essential objects of national security. The growing
volumes of statistical data, as well as the traditional uncertainty
and incompleteness of information on the nature of potential
threats, determine the need to use new approaches for risk
analysis. The neuro-fuzzy model considered in the article is based
on the advantages of fuzzy logic and artificial neural networks.
The proposed neuro-fuzzy network is adapted for continuous risk
analysis and iterative implementation of the analysis stage. It
eliminates the disadvantages of the fuzzy logical model and takes
full advantage of neural networks. This system copes well with
large volumes of information since there is a direct correlation
between the amount of data and the speed of network learning.
The data provided by the network at the output is expressed in
understandable terms and sufficient to make a balanced and
reasoned decision on information risk management.
Keywords : Neuro-Fuzzy Model, Risk, Information Risks, Risk
Management, National Security.
I. INTRODUCTION
In modern political realities, one of the essential factors in
ensuring the security of both the state as a whole and
individual business entities is information security.
Now in the era of the global spread of information
technology, state security is more than ever exposed to the
influence of information threats. That is why the
effectiveness of the information risk management system is
becoming a critical national security issue [1-3].It should be
immediately determined that information security will be
understood as the security of information resources and
information systems from accidental or deliberate influences
of a natural or artificial nature, fraught with damage to both
the system as a whole and its individual elements.
Revised Manuscript Received on August 20, 2019
* Correspondence Author
Alla Khomutenko*, Finance Department of Odessa National Economic
University, Odessa, Ukraine
Alla Mishchenko, Department of International Relations, Faculty of
Journalism and International Relations, Kyiv National University of Culture
and Arts, Kyiv, Ukraine
Artem Ripenko, Odessa Forensic Research Institute of Ministry of
Justice of Ukraine, Odessa, Ukraine
Olha Frum, Department of Industrial Economics, Odessa National
Academy of Food Technologies, Odessa, Ukraine
Zoreslava Liulchak, Department of Marketing and Logistics Lviv
Polytechnic National University, Lviv, Ukraine
Roman Hrozovskyi, Research Laboratory of the Department of
Application of Information Technologies and Information Fight of the
National Defence University of Ukraine named after Ivan Cherniakhovskyi,
Kyiv, Ukraine
Within the framework of this article, it is supposed to reduce
such a broad concept as information risk to two categories:-
associated with the leakage, alteration or destruction of
information;- associated with a malfunction in the operation
of software or hardware (caused by various factors of a
natural or artificial nature) [4-5].
The information risk management scheme can be simplified
represented in Fig. 1.
Fig. 1.Information Risk Management.
The primary stage of the risk management system is the
identification and identification of risks: analysis of possible
and existing vulnerabilities in the information processing and
storage system, identification of potential external and
internal threats, classification and verification of information
of particular value to the state. The stage of risk analysis and
assessment involves a qualitative and quantitative risk
assessment, the result of which is information that allows you
to make decisions about the necessary risk management
measures. The set of steps to counter risks at the state level
includes some measures aimed at reducing, adopting or
counteracting, the decision on the use of which is taken at a
senior level. The control and adjustment stage allows us to
evaluate the effectiveness of the measures taken and, if
necessary, launch the next iteration of the risk management
cycle [6-7].Naturally, specialists have been dealing with
these issues for more than a decade, and the mechanisms
developed are quite useful. At the same time, the very nature
of information risks, and the areas in which they arise
suggests the need for constant re-evaluation and
modernization of existing methods. As the key elements of
the system, it is possible to single out the stages of analysis
and risk assessment; it is for these points that it is proposed to
test the tools of the neuro-fuzzy model.
Information Risk
Management System
Methodology
for
identifying
and
identifying
risks
Risk
Assessment
and
Analysis
System
Package of
measures to
cope with
the risks
Mechanisms
for
monitoring
and adjusting
results
Tools of the Neuro-Fuzzy Model of Information
Risk Management in National Security
Alla Khomutenko, Alla Mishchenko, Artem Ripenko, Olha Frum, Zoreslava Liulchak
Roman Hrozovskyi