PSI - Issue 22
Jerzy STANIK et al. / Procedia Structural Integrity 22 (2019) 334–344 "Author name" / Structural Integrity Procedia 00 (2019) 000 – 000
337
4
Collection limit configuration safety
The design system and generate a security configuration
Process reconfiguration
Control subsystem Security attributes
Current Configuration Safety
IT ENVIRONMENT
Basic IT systems
Security Collection
Security register
Identification systems - threats, - vulnerability,
Assets and IT resources
A set of features IT utilities and security attributes resources
Areas factors risks
Automatic level control system
IT RISK
Risk analysis system
- efficient technical resources
Podsystem użytkowania zasobów IT
Threat Collection
Risk register
IT ENVIRONMENT
The system of automatic control of the IT resources suitability
Control and diagnostic system detecting IT failures
Current Configuration Functional
The design system and generate a functional configurations
Process reconfiguration
Control subsystem useful properties
Collection limit configuration functional
Figure 1. Illustration of PI from the point of view of controlling its functional properties and the level of functional safety. Source: Own study. This figure emphasizes two important elements: - – set of basic IT systems, - - the set of systems supporting the basic systems in order to maintain their basic IT usefulness features as well as the basic operational indices affecting the maintenance of acceptable risk levels in relation to individual features of usefulness of the engineering infrastructure. The set of basic systems comprises of , for example (Radziejewski 2013): transportation, power engineering, communication and water and sanitation systems, which include: roads, bus stops, railways, stations, river and sea ports, gas network, power grid, drainage, telecommunication facilities, etc. The set of supporting systems includes i.a.: IT system control system, automatic airworthiness control system (SAKZ), automatic safety control system (SAKB), control and diagnostic system, detecting all types of emergency situations, system of identification of efficient engineering resources, hazard identification system, system of safeguard and vulnerability identification, a system executing protective functions, a risk analysis and evaluation system. We assume that each of the above mentioned subsystems has certain capabilities or potential to perform tasks facing it[5]. Control of functional reliability of IT consists solely to generating the appropriate functional configurations, and control of functional security to generating proper security configurations. IT risk management comes down to the current maintenance of an acceptable level of risk with respect to resources included in basic IT systems as well as supporting systems (Napiórkowski , Hoffmann, Stanik, (2016)).
Made with FlippingBook Digital Publishing Software