Construction and Process Analysis of Generic Cabling and Security System in Weak Current Engineering

2021 ◽  
Author(s):  
O. Milov ◽  
S. Milevskyi ◽  
S. Pohasii ◽  
K. Rzayev

The subject of the research is a system of procedures implemented within the framework of a cybersecurity system, which is analyzed and described in a formal form. The aim of this work is to develop a formal description of the system of procedures implemented within the security system, which would automate the analysis, adaptation and design of the entire complex of processes operating within the cybersecurity system. The technique is based on the use of set theory, as well as system and process analysis. The tasks that need to be solved are to analyze existing approaches to the analysis of ongoing processes to identify their advantages and disadvantages. Based on the analysis, to propose a new formal presentation and classification of security system processes. The following results were obtained: the general characteristics of the security system processes were identified, the information and model bases of the security system were formed, which made it possible to present an approach to the classification and formal presentation of procedures implemented in security systems. Conclusion: The approach to the classification and the formal description of the procedures implemented in the security system presented in the article allows us to formalize the approach to the analysis and subsequent synthesis of the necessary procedural basis for the design and reengineering of security systems, in a more understandable way to the decision-maker. Thus, the efficiency of managing the mechanisms for protecting the contour of business processes is increased.


1950 ◽  
Vol 14 (3) ◽  
pp. 235-235
Author(s):  
No authorship indicated

2020 ◽  
Vol 3 (2) ◽  
pp. 182-186
Author(s):  
Lisnayani Silalahi ◽  
Anita Sindar

Data security and confidentiality is currently a very important issue and continues to grow. Several cases concerning data security are now a job that requires handling and security costs that are so large. To maintain the security and confidentiality of messages, data, or information so that no one can read or understand it, except for the rightful recipients, a data security system application with an encryption method using an algorithm is designed. The SHA-1 cryptographic hash function that takes input and produces a 160-bit hash value which is known as the message iteration is usually rendered as a 40-digit long hexadecimal number.


2019 ◽  
Vol 10 (1) ◽  
pp. 1-27
Author(s):  
Aniek Wijayanti

Business Process Analysis can be used to eliminate or reduce a waste cost caused by non value added activities that exist in a process. This research aims at evaluating activities carried out in the natural material procurement process in the PT XYZ, calculating the effectiveness of the process cycle, finding a way to improve the process management, and calculating the cost reduction that can achieved by activity management. A case study was the approach of this research. The researcher obtained research data throughout deep interviews with the staff who directly involved in the process, observation, and documentation of natural material procurement. The result of this study show that the effectiveness of the process cycle of natural material procurement in the factory reached as much as 87,1% for the sand material and 72% for the crushed stone. This indicates that the process still carry activities with no added value and still contain ineffective costs. Through the Business Process Mechanism, these non value added activities can be managed so that the process cycle becomes more efficient and cost effectiveness is achieved. The result of the effective cycle calculation after the management activities implementation is 100%. This means that the cost of natural material procurement process has become effective. The result of calculation of the estimated cost reduction as a result of management activity is as much as Rp249.026.635,90 per year.


Sign in / Sign up

Export Citation Format

Share Document