PSI - Issue 22
Jerzy STANIK et al. / Procedia Structural Integrity 22 (2019) 322–333 "Author name" / Structural Integrity Procedia 00 (2019) 000 – 000
326
5
Control system for IT usability properties
Risk management system
Deciding entity
A set of control decisions
Controlling
properties
DECISION
utility
RISK
Controlling system
potentials
(Resources)
Information on the level of IT usability
Information about system states
IT
System A IT
System 1
Collection threats
Systems supporting IT
they own
Systems
basic IT
they protect against
use
they own
A set of IT usable features: Reliability, Security, Business continuity, functionality, Efficiency, Complexity
System N IT
System K
Collection vulnerability of IT systems and security
Collection security
they own
Fig. 1. IT illustration from the point of view of controlling its usefulness features. Source: Own study.
This figure emphasizes two important basic elements: the system for controlling the IT usefulness properties, the basic elements of the engineering infrastructure from the point of view of maintaining the required usefulness and risk management. Maintaining an acceptable level of risk in relation to individual IT usefulness features also requires the existence of appropriate mechanisms, e.g.: automatic airworthiness control (SAK) systems, properly prepared IT systems (SI), enabling determination of real and hypothetical potentials that individual IT systems have in relation to particular IT usefulness features, namely: the potential of real infrastructure losses reflecting the quantitative (operational) level of effects resulting from the loss of usefulness feature for all IT or a specific subset of basic systems, potential of real (actual) hazards Ζ , interacting on IT or its systems in relation to the u-th usefulness feature, the potential of the real capabilities of the safeguard system , constituting a protective shield of IT or its basic systems in relation to the u-th usefulness feature, potential weaknesses of the vulnerability system, understood as the potential of actual ∆ IT vulnerabilities detected by the implemented solutions both in the safeguard system and in the basic IT systems, in relation to the u-th feature of usefulness.
Made with FlippingBook Digital Publishing Software