Abstract
The purpose of this work is to develop the foundations of a new approach to the problem of information security in the context of "Big Data" technologies. The purpose of obtaining and processing information about the subject area is their subsequent use for the formation of targeted impacts on the control object. At the same time, observation and awareness of what is happening with the object was previously carried out through a certain system of informatization of the subject's activity, i.e. indirectly, and the implementation of the decision was carried out within the framework of the control object, i.e. directly. Under the conditions of Digital Transformation, the impact on the control object is carried out not directly, but on its "Digital Twin" with subsequent reduction, if necessary, of this impact on the physical control object. Thus, a system of digitalization of the subject's activity appears. When implementing such systems, one of the main principles is the principle of system security (ensuring information security). However, its implementation is hampered by the fact that "Big Data" technologies are associated not so much with their large volumes, but also with the need to process a variety of consolidated data that have a different structure, classification and indexing schemes. In this regard, it is proposed to analyze the DIKW-model and analyze the essence of the concepts included in it, which will make it possible to proceed to DIKW processing using "Big Data" technologies. At the same time, it becomes necessary to solve two problems: assessing the impact of the degree of consolidation of data, information and knowledge on the increase in their importance in ensuring the information security of the subject of the "Big Data" space and assessing the critical mass of data, information and knowledge available in the "Big Data" space, with from the point of view of their complex joint processing and obtaining more important information on their basis. To establish the necessary balance between the need for information exchange and the permissible restrictions on the dissemination of data, information and knowledge, a new virtual concept is introduced - "Information Boundary" and the issue of ensuring information security is reduced to the task of pragmatically justified access restriction for all levels of the DIKW-model and the concept of "DIKW - security. An intensional approach is proposed for controlling "Information Boundaries" in the process of using "Big Data" technologies, which ensures the transition from static solutions to the issues of ensuring the subject's information security to the implementation of dynamic procedures for such control using elements of Artificial Intelligence, monitoring this space and predicting one's "place" in the "Big Data" space.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.