Developing a strategy to achieve the goals of ensuring information security of the metropolis

UDC 33
Publication date: 30.01.2023
International Journal of Professional Science №1-2023

Developing a strategy to achieve the goals of ensuring information security of the metropolis

Glushchenko V.M.,
Pronkin N.N.

1. doctor of Economics, Professor, honorary worker of higher professional education of the Russian Federation – Moscow city University of management of the government of Moscow.
2. PhD, associate Professor – Sechenov First Moscow state medical University of the Ministry of health of the Russian Federation (Sechenov University).
Abstract: In the article on the basis of the system analysis the strategy of achieving the goals of information security of the Moscow metropolis is considered. In accordance with the statement of the problem, focused on changing the existing state, the development of strategies is conducted in terms of change in relation to some basic variant of development.
Keywords: Moscow megapolis, information security, private strategy


It is necessary to develop a unified strategy of the system that would ensure the most effective elimination or mitigation of existing problems. We can say that the task ahead is to formulate a unified strategy from particular strategies for solving individual problems. The essence of the strategy for solving each individual problem is the implementation of certain changes in the problem system (element) and its external environment.

In accordance with the formulation of the problem of solving a problem focused on changing the existing state, the development of strategies is carried out in terms of changes in relation to some basic development option, resulting from extrapolation of the prevailing trends, and the available ways and possibilities for implementing changes. The list of such changes characterizes the structure of the strategy and at the same time sets target standards for the development of complexes of measures for its implementation.

The active solution of the problem, as it was noted, involves the elimination or compensation of the factors that cause the occurrence and reproduction of the problem. In order to consider from these positions, the issues of developing a single strategy for the development of a problem system, it is necessary to analyze the structure of the factors of the problem situation and, on this basis, to investigate the structure of measures to eliminate them, in order to identify those elementary blocks from which a single strategy can be assembled.

One of such blocks is a private strategy, which is understood as a set of actions aimed at eliminating a problematic situation or in one of the subsystems in one of the activities of the Moscow Government. As a rule, private strategies combine elementary, object, group and functional strategies.

Since the quality of functioning of a single subsystem (line of activity) can be influenced simultaneously by several negative factors, each of which can be eliminated and compensated in various ways, it seems appropriate to initially consider a possible control effect characterized by a single object, as well as a subject and a method of influence on a separate factor. These impacts can be grouped in various aspects: concrete results, objects, subjects and the mechanism of impact. If they are combined from the position of a common control object, i.e. a factor that is the subject of control, then for each factor an appropriate strategy can be selected that allows it to be eliminated or compensated – an elementary strategy. In other words, the controlling influence on the factor is the basis for combining several subjects, forms and methods of management into an elementary strategy.

A set of control actions aimed at improving the quality of functioning of a certain functional element of the system gives an object strategy.

Combining object strategies into groups of the same type of functional elements belonging to different functional subsystems of the problem system is a group strategy.

Object strategies can also be combined on the basis of improving the properties of functional subsystems to which the corresponding elements belong. Such an association will form a functional strategy.

Mixed strategies will be considered a set of private strategies combined on the basis of improving various problematic characteristics of the system in question as a whole.

The combination of mixed strategies provides a general strategy for changing other properties of the problem system. At the same time, it is obvious that the costs and results of the implementation of individual mixed strategies and their arbitrary combinations vary. Therefore, the formation of a unified strategy is the task of choosing the most effective combination of options for the implementation of mixed and separate private strategies.

In the process of forming a unified strategy for solving the problem, the first source of information for us is developments on individual private strategies, but at the same time we can also obtain characteristics that go beyond the scope of the developments carried out. This implies the active use of expert analysis. Therefore, the second source of information is expert estimates.

Based on the choice of a single strategy for solving the problem for each particular strategy, the normative properties of the functional subsystems implementing them are formed, then it is necessary to assess the achievability of these normative properties by each real system. In the case of a negative assessment, the unified strategy should be revised accordingly, and in the case of a positive assessment, it is necessary to proceed to the next stage of analysis – determining the conditions under which these normative properties can be achieved.

It should be noted that during the development of the strategy, the task arises of forming alternative options for achieving the required characteristics of the various elements of the system under consideration and the links between them.

There are two approaches to its solution: the first, a purely expert approach based on the use of heuristic procedures such as «brainstorm», Delphi method, etc., and the second approach based on the widest possible systematic view of the object of planning and management and on more or less ordered procedures relations with each of the elements of this object of possible control actions. It is quite difficult to determine in advance which approach will be more effective. Apparently, they should complement each other. For example, a formal-logical approach can set a kind of strategy skeleton, which then acquires concrete content using heuristic methods.

Theoretically, the number of alternative ways to solve problems in the field of ensuring the information security of a megalopolis can sometimes be significant. Some of the alternative solutions may seem quite acceptable, some naive. The question, obviously, is whether we can actually list all possible ways to solve the problem and whether there is hope to analyze all these ways, compare them with each other. Both from a theoretical and practical point of view, a positive answer should be given to the first part of the question: in principle, for any problem in the field of ensuring information security of a megalopolis, theory and practice can suggest a list of specific ways to solve them. As for the second part of the question – about the possibility of analyzing all these ways and comparing them, it is possible to answer only by considering a specific problem, probable ways to solve it and options that can be developed in sufficient quantity on each way of solving the problem. Thus, a contradiction may arise: if all possible strategies cannot be chosen for analysis, then the best solution to the problem may not be found. In other words, the «problem solving tree» will not give us what it was made for.

Let’s consider how this contradiction can be practically resolved. Obviously, here we need to answer the question of how many strategies should be developed. Practice in various fields of activity shows that the maximum possible number of alternatives is, as a rule, seven. Most often, five alternatives are taken, and if there is no time to solve the problem, you can limit yourself to three.

Thus, if the number of alternative options being developed for each of the ways to solve the problem is in the range of 3-7, then it is practically possible to proceed to the following procedure — identifying the advantages and disadvantages of each alternative solution strategy in relation to the goal or goals.

The choice of a rational variant of the information security strategy of the city of Moscow, even if there is a list of advantages and disadvantages of alternatives, is the most difficult. The complexity is manifested in the fact that in order to evaluate alternative solutions to the problem, it is necessary to find a single measure of all advantages and disadvantages for all alternatives. In other words, to find a way to determine the indicator of the effectiveness of solutions to the problem, which would be expressed in comparable quantities. Then, having the corresponding performance indicators for many alternative solutions to the problem, you can choose the best solution for the maximum (minimum) value of the indicator.

Techniques for choosing the best solution are reduced to three groups of methods. The first group consists of methods based on the use of quantitative characteristics of alternative elements. The second group includes methods based on the use of qualitative characteristics of alternative elements. The third group includes methods based on the use of both quantitative and qualitative characteristics of alternative elements.

When considering these groups, it should be emphasized that the implementation of problem-solving methods involves the widespread use of experiments. It is from them that the correctness of the evaluation of alternatives and the choice of the best solution will largely depend.

References

1. Assessment of the Impact of Cloud Technologies on Social Life in the Era of Digitalization / E. Panfilova, A. Lukyanova, N. Pronkin, E. Zatsarinnaya // International Journal of Interactive Mobile Technologies. – 2021. – Vol. 15. – No 21. – P. 144-157. – DOI 10.3991/ijim.v15i21.22985. – EDN TYMFFZ.
2. Epizootiological aspects of natural nidality of Ixodes tick-borne borreliosis in the Moscow region (Russian Federation) / A. Mukhametov, M. Osadchuk, I. Berechikidze, N. Pronkin // Veterinary World. – 2022. – Vol. 15. – No 1. – P. 213-219. – DOI 10.14202/vetworld.2022.213-219. – EDN QCOECT.
3. Gluschenko, V. M. Analysis of the problems of ensuring information security of the megalopolis / V. M. Gluschenko, N. N. Pronkin, A. I. Simakov // International Journal of Professional Science. – 2021. – No 1. – P. 43-49. – EDN WXRRSL.
4. Glushchenko, V. M. Methodology for assessing the integral potential damage to information security / V. M. Glushchenko, N. N. Pronkin // International Journal of Professional Science. – 2021. – No 8. – P. 24-31. – DOI 10.54092/25421085_2021_8_24. – EDN CJAATO.
5. Glushchenko, V. M. Principles for assessing potential and prevented damage to the information security of a megapolis / V. M. Glushchenko, N. N. Pronkin // International Journal of Professional Science. – 2021. – No 7. – P. 5-8. – EDN PMHAFX.
6. Glushchenko, V. M. Principles of functioning of the information security system / V. M. Glushchenko, N. N. Pronkin, A. I. Simakov // International Journal of Professional Science. – 2021. – No 9. – P. 20-26. – DOI 10.54092/25421085_2021_9_20. – EDN VWEHSQ.
7. Glushchenko, V. M. Principles of functioning of the information security system / V. M. Glushchenko, N. N. Pronkin, A. I. Simakov // International Journal of Professional Science. – 2021. – No 9. – P. 20-26. – DOI 10.54092/25421085_2021_9_20. – EDN VWEHSQ.
8. Glushkov, S. V. Threats to the information security system Moscow megalopolis / S. V. Glushkov, N. N. Pronkin, I. F. Semenycheva // International Journal of Professional Science. – 2022. – No 2. – P. 17-21. – DOI 10.54092/25421085_2022_2_18. – EDN LNIVQY.
9. Greibo S.V., Pronkin N.N., Filippova O.V. Information system for monitoring the movement of drug products. advances in economics, business and management research. International scientific and practical conference on. Цифровая экономика. 2019. Т. 105. № 1. С. 924.
10. Psychosomatic symptoms in preschool children and how to treat them / N. Voronova, S. Pershikov, E. Garina, N. Pronkin // Rivista di Psichiatria. – 2022. – Vol. 57. – No 2. – P. 88-93. – DOI 10.1708/3790.37740. – EDN FAYLVM.
11. Staffing information security systems Moscow megalopolis / S. V. Glushkov, S. V. Greibo, N. N. Pronkin, I. F. Semenycheva // International Journal of Professional Science. – 2022. – No 3. – P. 34-41. – DOI 10.54092/25421085_2022_3_34. – EDN RWNCWB.
12. АВН: 20 лет создания инноваций для обороны России: Научно-исторический очерк. – Москва: Академия военных наук, 2015. – 136 с. – EDN UZNXMQ.
13. Брусницын H.A. Информационная война и безопасность. М.: Вита-Пресс, 2001.
14. Возможные подходы к оценке ущерба от информационных угроз / В. М. Глущенко, Н. Н. Пронькин, А. И. Симаков, Т. Е. Новоселова // Экономические исследования и разработки. – 2020. – № 9. – С. 6-13. – EDN IJBMAP.
15. Глущенко В.М., Новиков А.Н., Пронькин Н.Н. Особенности формирования и содержания модели управления московским мегаполисом. Информационные и телекоммуникационные технологии. 2019. № 44. С. 32-37.
16. Глущенко, В. М. Этапы выработки стратегического решения по обеспечению информационной безопасности мегаполиса / В. М. Глущенко, А. Н. Новиков, Н. Н. Пронькин // Экономические исследования и разработки. – 2021. – № 2. – С. 96-101. – EDN OFLLKH.
17. Информационная безопасность и защита информации / А. Н. Новиков, В. М. Глущенко, Н. Н. Пронькин, М. Н. Малышев ; Московский городской университет управления Правительства Москвы. – Москва : Московский городской университет управления Правительства Москвы, 2011. – 72 с. – (Учебно-методический комплекс). – EDN ZIFPYT.
18. Информационная безопасность мегаполиса на примере города Москвы. Монография / Н.Н. Пронькин – М.: ООО «Экслибрис-Пресс», 2017.
19. Информационная технология баз данных в медицине. Часть II / И. А. Иконникова, Т. Е. Новоселова, Н. Н. Пронькин, И. Ф. Семенычева. – Москва : Профессиональная наука, 2021. – 78 с. – ISBN 978-1-387-25950-2. – EDN AXDLIW.
20. Информационные технологии в управленческой деятельности: учебное пособие для гос. служащих г. Москвы, обучающихся по образоват. программе повышения квалификации / В. М. Глущенко, В. С. Елизаров, Н. Н. Пронькин, А. Н. Новиков. – Москва: Московский городской университет управления Правительства Москвы, 2010. – 264 с. – ISBN 978-5-98279-900-5. – EDN TLZMOX.
21. Пронькин Н.Н. Информационная безопасность мегаполиса на примере города Москвы. Монография /– М.: ООО «Экслибрис-Пресс», 2017.
22. Пронькин Н.Н. Практика внедрения системы дистанционного обучения в МГУУ Правительства Москвы на основе E-learning 3000. Информационные и телекоммуникационные технологии. 2011. № 12. С. 72-78.
23. Пронькин, Н. Н. Информационная безопасность мегаполиса на примере города Москвы : Монография / Н. Н. Пронькин. – Москва : Экслибрис-Пресс, 2017. – 112 с. – ISBN 978-5-88161-404-1. – EDN XZLZBZ.
24. Пронькин, Н. Н. Практика внедрения системы дистанционного обучения в МГУУ Правительства Москвы на основе E-LEARNING 3000 / Н. Н. Пронькин // Информационные и телекоммуникационные технологии. – 2011. – № 12. – С. 72-78. – EDN MHSFFE.
25. Пронькин, Н. Н. Стратегия обеспечения информационной безопасности московского мегаполиса / Н. Н. Пронькин. – Москва : Экслибрис-Пресс, 2019. – 136 с. – ISBN 978-5-88161-415-7. – EDN SLGKDE.
26. Пронькин, Н. Н. Формирование целевой программы обеспечения информационной безопасности города Москвы / Н. Н. Пронькин, А. И. Симаков // Экономические исследования и разработки. – 2020. – № 6. – С. 61-67. – EDN ITZZWR.
27. Свидетельство о государственной регистрации программы для ЭВМ № 2020614013 Российская Федерация. Программа подготовки матриц коэффициентов соизмеримости : № 2020612944 : заявл. 17.03.2020 : опубл. 25.03.2020 / Н. Н. Пронькин ; заявитель федеральное государственное автономное образовательное учреждение высшего образования Первый Московский государственный медицинский университет имени И.М. Сеченова Министерства здравоохранения Российской Федерации (Сеченовский Университет) (ФГАОУ ВО Первый МГМУ им. И.М. Сеченова Минздрава России (Сеченовский Университет). – EDN GBOLXP.
28. Свидетельство о государственной регистрации программы для ЭВМ № 2020614012 Российская Федерация. Программа настройки моделирующего комплекса на нужные имена баз данных : № 2020612945 : заявл. 17.03.2020 : опубл. 25.03.2020 / Н. Н. Пронькин ; заявитель федеральное государственное автономное образовательное учреждение высшего образования Первый Московский государственный медицинский университет имени И.М. Сеченова Министерства здравоохранения Российской Федерации (Сеченовский Университет) (ФГАОУ ВО Первый МГМУ им. И.М. Сеченова Минздрава России (Сеченовский Университет). – EDN SVBVRQ.
29. Свидетельство о государственной регистрации программы для ЭВМ № 2020614011 Российская Федерация. Программа коррекции прямых наборов данных : № 2020612947 : заявл. 17.03.2020 : опубл. 25.03.2020 / Н. Н. Пронькин ; заявитель федеральное государственное автономное образовательное учреждение высшего образования Первый Московский государственный медицинский университет имени И.М. Сеченова Министерства здравоохранения Российской Федерации (Сеченовский Университет) (ФГАОУ ВО Первый МГМУ им. И.М. Сеченова Минздрава России (Сеченовский Университет). – EDN DXYVTU.
30. Структура целевой программы обеспечения информационной безопасности города Москвы / В. М. Глущенко, Н. Н. Пронькин, А. И. Симаков, И. Ф. Семенычева // International Journal of Professional Science. – 2020. – № 9. – С. 17-25. – EDN MLRRVF.