Article Preview
Top1 Introduction
The rapid development of information technology in the first two decades of the 21st century has led to a number of new challenges. Such tasks include, first of all, the tasks of security assessment, provision and management. In this case, these problems are solved for each subject area independently. There are cybersecurity, information security, functional security and other types of security that can be attributed to IT security and the so-called high security (Kharchenko, 2020; Kharchenko & Yastrebenetsky, 2020). In addition, the concept of knowledge security (Mittal et al., 2010; Zwilling et al., 2020) or knowledge-oriented security has already appeared.
The question arises whether it is possible to establish relationships between these components of security, as well as what forms of relationships can combine them?
Since the basic concepts in information technology are the concepts of “data”, “information” and “knowledge”, it is possible to assume that the very establishment of the form of relations between these concepts will ultimately ensure the establishment of the form of relations for various forms of information technology security.
The analysis of the content of basic concepts used in information technology is performed in (Dotsenko, 2020; Lancaster, 2000).
There are causal relationships between the concepts of “data”, “information” and “knowledge”. Information is data endowed with significance and goals, knowledge is the ability to turn information and data into effective actions (Drucker, 1992). On the other hand, the analysis performed in (Dotsenko, 2020; Dotsenko et al., 2019) showed that there is a dialectical connection between these concepts in the form of “general - single” (Hegel, 1969). Based on this, we hypothesize that information security has dialectically interconnected components, each of which is determined by the content of the following concepts: “data security” - “information security” - “knowledge security” - “intelligence security”.
It should be noted that the concepts of “data”, “information” and “knowledge” define only part of the properties of human mental activity. An important problem is to define the meaning of the concepts “thinking”, “intellect”, “reason”, “mind”, “meaning”, “understanding” and a number of other concepts. Thus, there is a problem of considering the content and form of relations for all the above concepts in the context of information technology security and security management.
The approach to the construction of integrated enterprise security management systems considered in previous works (Dotsenko & Fesenko, 2020; Dotsenko et al., 2019; Kharchenko et al., 2019) provided an opportunity to form a concept and develop the structure of such a system with interconnected control loops of physical IT-security, information and cyber security, functional and ecology safety at the level of technologies IT (information), OT (operation) and ET (physical environment). Therefore, the following step of research is logical, understandable and important to describe more general picture of security and safety management contours considering chains of transformation from data to knowledge, intelligence and activities.