Probabilistic Modeling in System Engineering 2018
DOI: 10.5772/intechopen.75232
|View full text |Cite
|
Sign up to set email alerts
|

Periodic Monitoring and Recovery of Resources in Information Systems

Abstract: This section deals with the issues of business continuity and recovery after disasters. The authors analyzed standards, laws, and regulations pertaining to the parameters of periodic monitoring and recovery in information systems. This section includes mathematical models of resources and environment periodic monitoring as well as periodic backup and recovery after interruptions or disasters. The work demonstrates that the well-known deterministic periodic monitoring and backup models do not take into account … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
7
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(7 citation statements)
references
References 7 publications
0
7
0
Order By: Relevance
“…Decision makers should understand that in the process of evolution of information technologies and infrastructure that irreversibly led to their globalization and transboundary nature, the confrontation has shifted to the third defensive setting [20], while information security systems basically have stopped at the second. The emergence of new and improvement of existing information technologies is constantly and almost continuously (for example, updates of Android applications come out in Google Play on average once every 28 days), while the processes of improving the information security system have pronounced functioning intervals with long regulated cycles [21]. The fair desire to verify the protection means with higher reliability is connected with the inability to significantly reduce these cycles and bring them closer to the rate of innovation in information technology.…”
Section: Discussionmentioning
confidence: 99%
“…Decision makers should understand that in the process of evolution of information technologies and infrastructure that irreversibly led to their globalization and transboundary nature, the confrontation has shifted to the third defensive setting [20], while information security systems basically have stopped at the second. The emergence of new and improvement of existing information technologies is constantly and almost continuously (for example, updates of Android applications come out in Google Play on average once every 28 days), while the processes of improving the information security system have pronounced functioning intervals with long regulated cycles [21]. The fair desire to verify the protection means with higher reliability is connected with the inability to significantly reduce these cycles and bring them closer to the rate of innovation in information technology.…”
Section: Discussionmentioning
confidence: 99%
“…During the initial stage, main parameters of the social network's subjects are determined. The trust matrix is formed, and the communication skills of the subjects, their perception level, information transfer coefficient and the initial opinion about the given issue are determined [43][44][45][46][47].…”
Section: Communication Skillsmentioning
confidence: 99%
“…There are a few taxonomies of mathematical software reliability models known at present [2,[19][20][21][22]. We believe that, from the applied perspective, it is convenient to use the classification relating to the objectives of software product/system testing stages [21], which allows 4 types of mathematical models to be singled out: [3,[21][22][23][24][25][26] which imply a strictly monotonous growth of software reliability. At present, this is not always consistent with current multiversion programming technologies.…”
Section: Debugging Modelmentioning
confidence: 99%