PSI - Issue 22

Jerzy STANIK et al. / Procedia Structural Integrity 22 (2019) 334–344 "Author name" / Structural Integrity Procedia 00 (2019) 000 – 000

337

4

Collection limit configuration safety

The design system and generate a security configuration

Process reconfiguration

Control subsystem Security attributes

Current Configuration Safety

IT ENVIRONMENT

Basic IT systems

Security Collection

Security register

Identification systems - threats, - vulnerability,

Assets and IT resources

A set of features IT utilities and security attributes resources

Areas factors risks

Automatic level control system

IT RISK

Risk analysis system

- efficient technical resources

Podsystem użytkowania zasobów IT

Threat Collection

Risk register

IT ENVIRONMENT

The system of automatic control of the IT resources suitability

Control and diagnostic system detecting IT failures

Current Configuration Functional

The design system and generate a functional configurations

Process reconfiguration

Control subsystem useful properties

Collection limit configuration functional

Figure 1. Illustration of PI from the point of view of controlling its functional properties and the level of functional safety. Source: Own study. This figure emphasizes two important elements: - – set of basic IT systems, - - the set of systems supporting the basic systems in order to maintain their basic IT usefulness features as well as the basic operational indices affecting the maintenance of acceptable risk levels in relation to individual features of usefulness of the engineering infrastructure. The set of basic systems comprises of , for example (Radziejewski 2013): transportation, power engineering, communication and water and sanitation systems, which include: roads, bus stops, railways, stations, river and sea ports, gas network, power grid, drainage, telecommunication facilities, etc. The set of supporting systems includes i.a.: IT system control system, automatic airworthiness control system (SAKZ), automatic safety control system (SAKB), control and diagnostic system, detecting all types of emergency situations, system of identification of efficient engineering resources, hazard identification system, system of safeguard and vulnerability identification, a system executing protective functions, a risk analysis and evaluation system. We assume that each of the above mentioned subsystems has certain capabilities or potential to perform tasks facing it[5]. Control of functional reliability of IT consists solely to generating the appropriate functional configurations, and control of functional security to generating proper security configurations. IT risk management comes down to the current maintenance of an acceptable level of risk with respect to resources included in basic IT systems as well as supporting systems (Napiórkowski , Hoffmann, Stanik, (2016)).

Made with FlippingBook Digital Publishing Software