Article details

Title: Applications of Expert Systems for Protecting Information in Military Information Systems
Author(s): Catalin Cioaca   Elena Corina Boscoianu   Bogdan-Alexandru Belega            

Abstract: Integrating the results of technological progress (hardware and software) in the military field is already an essential element in providing operational advantages. In these circumstances, to ensure the availability, integrity and confidentiality is a must. One of the solutions provided by the expert systems in the field of evaluating the level of information protection in military systems is presented in this paper. The result is an easy to use system, modern, modular and scalable, which provides support in decision-making for vulnerabilities, setting the security level information and anticipating solutions for limiting the consequences of possible IT security incidents.

Keywords: cyber security, expert system, military information systems, IT risk assessment.

References:

[1] M. MUREȘAN - Mainframes. Complexity, Structuralism and Functionality of Military System, Military Writers Society, Bucharest, Romania, 2004 (in Romanian)
[2] N. FALESSI, R. GAVRILA, R. KLEJNSTRUP, K. MOULINOS – National Cyber Security Strategies. Practical Guide on Development and Execution,European Network and Information Security Agency, ENISA, Dec. 2012
[3] D. CHANDLER – Technological or Media Determinism, 2000, http://www.aber.ac.uk/media/Documents/tecdet/tdet01.html
[4]*** – Government Decision (GD) no. 271/2013 for the approval of Romania Cyber Security Strategy and National Action Plan for the Implementation of the National Cybersecurity System, Part I, No. 296, 23.05.2013
[5] ***– National Defence Strategy for 2015-2019, A Strong Romania within Europe and the World, (SNAT), Bucharest, 2015
[6] C. CIOACĂ, M. BOȘCOIANU – Information Resources Management under Uncertainty, “Henri Coandă” Air Force Academy Publisher, 2015 (in Romanian)
[7] C. CIOACĂ – Extreme Security Risk Management in Aeronautical Systems, “Henri Coanda” Air Force Academy Publisher, Brașov, 2014 (in Romanian)
[8] N.G. LEVESON Engineering a Safer World: Systems Thinking Applied to Safety, MIT Press, 2011
[9] P. CICHONSKI, T. MILLAR, T. GRANCE, K. SCARFONE – Computer Security Incident Handling Guide, National Institute of Standards and Technology, Revision 2, 2012, http://nvlpubs.nist.gov/nistpubs/ SpecialPublications/NIST.SP.800-61r2.pdf
[10] S.M. BRIDGES, R.B. VAUGHN – Intrusion Detection via Fuzzy Data Mining, Proc. of 12th Annual Canadian Information Technology Security Symposium, pp. 109-122, Ottawa, Canada, Jun. 19-23, 2000
[11]*** – Law No. 182 of 12 April 2002 Regarding the Protection of Classified Information, The Parliament of Romania, Bucharest, Romania, 2016
[12] S. HOLBAN – Decision Support Systems. Distance Learning Course, „Ștefan cel Mare” University of Suceava, Suceava, Romania, 2014 (in Romanian)
[13] M. URSĂCESCU – Information Systems, Economic Publishing House, Bucharest, Romania, 2002 (in Romanian)
[14] I. ANDONE, A. TUGUI – Intelligent Systems in Management, Accounting, Finance and Banking and Marketing, Economic Publishing House, Bucharest, Romania, 1999 (in Romanian)2011
[15] *** – Protection of Classified Information. Practical Guide, Romanian Intelligence Service (SRI), https://www.sri.ro/fisiere/protectia-inf-cls-ghid.pdf Aug. 2016 (in Romanian)
[16] R. SHANMUGAVADIVU, N. NAGARAJAN – Network Intrusion Detection System Using Fuzzy Logic, Indian Journal of Computer Science and Engineering (IJCSE), Vol. 2, No. 1, pp. 101-111, 2011