The article attempts to make an approach to the impact of network centric infostructure on the command, control and management processes. The thesis of the article is to confirm the complexity of the mutual interaction between network centric architecture and decision making systems. Basing on the conducted considerations both the operational and functional models of network centric infostructure are developed according to the Information Superiority value chains quoted by RAND Institute. Following chapters present the effectiveness of network centric structures in the area of C4ISR and management processes resulted from sensors architecture and performance. Issuing from network centric warfighting concepts and approach has been done on the evaluation of the impact of information advantage and domination on military operations. At the end of the article the Euro-Atlantic approach to the network centric infostructure is quoted. The achievement of NATO Network Enabled Capability is being treated as a key issue to NATO transformation and has been reflected and developed as a conceptual Overarching and Technical Architecture. Such an approach has also an impact on one of the principal information security rules - “need to know”, revaluated to the principle of “need to share”. The conclusion points out, that the “synergic effect” of network centric infostructure should raise the “situational consciousness”.
Stałym elementem polityki bezpieczeństwa jest prowadzenie bieżących analiz związanych z podatnością systemów informatycznych na zagrożenia, tzw. analiza zagrożeń. Z pojęciem tym wiąże się zarządzanie ryzykiem, obejmujące system metod i działań zmierzających do obniżenia stopnia oddziaływania ryzyka na funkcjonowanie systemu, pozwalających na podejmowanie decyzji optymalnych. W niniejszej artykule przedstawiono stosowane metody zarządzania ryzykiem w systemach i sieciach teleinformatycznych.
EN
The constant element of security policy is conducting of current analyses, connected with vulnerability IT systems to threats, so called threats analysis. This includes risk management, comprising methods and activities towards decreasing influence of risk level on system functionality, which allow an optimal decision taking. This publication shows suitable methods of risk management in IT systems and networks
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.