Abstract

Research aim. Improving the efficiency of solving information security tasks by eliminating standard technical barriers that prevent the application of artificial intelligence technologies in advanced information security systems. Research method. The article applies the method of functional decomposition of intelligent tasks of information security, based on the analogy of artificial and natural intelligence. With respect to the proposed functional structure, the intelligent information security system is decomposed according to the processes of its life cycle with the specific tasks of technical regulation identification, that is specific to each of the processes, and the subsequent aggregation of tasks into groups corresponding to the main areas of standardization of such systems is performed. Results obtained. The research presents a structured list of information security tasks, the solution quality of which can be improved with the use of artificial intelligence technologies. It is shown that the main standard technical barriers to the effective creation and application of intelligent information security systems are associated with the shortcomings of metrological support for intelligent systems, also with the peculiarities of ensuring the confidentiality of information processed in such systems. The analysis of the current state of work on the preparation of national and international standards governing the creation and application of intelligent information security systems is carried out, and it is indicated that the work in this direction is of an initial, staged nature. The list of specific standardization tasks aimed at overcoming the identified standard technical barriers in the implementation of individual processes of the intelligent systems life cycle is justified. Specific tasks are grouped by the main standardization areas, for each of which the proposals for the adjustment of existing and the development of new standard technical documents in the field of artificial intelligence and information security are prepared.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call