{"title":"使用IDEF0方法监测系统开发","authors":"Nikolay Y. Tsiberman, Viktor M. Belov","doi":"10.17212/2782-2230-2023-2-71-81","DOIUrl":null,"url":null,"abstract":"There are many specialized methodologies for modeling systems and business processes. One of them is the methodology IDEF0, the relevance of which is confirmed by high efficiency of the use and rationalization of various processes taking place in complex systems. This article discusses the methodology of IDEF0, as well as its advantages and basic concepts. In the sec-ond chapter of the paper, a functional model of a monitoring system for finding vulnerabilities in local networks, developed with the help of this methodology, is described. The model was used to represent the system processes and their interaction with each other graphically, which allowed us to optimally determine the main development steps, localize the weaknesses of the system at the planning stage and improve the understanding of how the system should work. As a result, a functional model consisting of four decomposition levels and six schemes was made.","PeriodicalId":207311,"journal":{"name":"Digital Technology Security","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Using the IDEF0 methodology in monitoring system development\",\"authors\":\"Nikolay Y. Tsiberman, Viktor M. Belov\",\"doi\":\"10.17212/2782-2230-2023-2-71-81\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"There are many specialized methodologies for modeling systems and business processes. One of them is the methodology IDEF0, the relevance of which is confirmed by high efficiency of the use and rationalization of various processes taking place in complex systems. This article discusses the methodology of IDEF0, as well as its advantages and basic concepts. In the sec-ond chapter of the paper, a functional model of a monitoring system for finding vulnerabilities in local networks, developed with the help of this methodology, is described. The model was used to represent the system processes and their interaction with each other graphically, which allowed us to optimally determine the main development steps, localize the weaknesses of the system at the planning stage and improve the understanding of how the system should work. As a result, a functional model consisting of four decomposition levels and six schemes was made.\",\"PeriodicalId\":207311,\"journal\":{\"name\":\"Digital Technology Security\",\"volume\":\"13 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-06-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Digital Technology Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.17212/2782-2230-2023-2-71-81\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Digital Technology Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.17212/2782-2230-2023-2-71-81","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Using the IDEF0 methodology in monitoring system development
There are many specialized methodologies for modeling systems and business processes. One of them is the methodology IDEF0, the relevance of which is confirmed by high efficiency of the use and rationalization of various processes taking place in complex systems. This article discusses the methodology of IDEF0, as well as its advantages and basic concepts. In the sec-ond chapter of the paper, a functional model of a monitoring system for finding vulnerabilities in local networks, developed with the help of this methodology, is described. The model was used to represent the system processes and their interaction with each other graphically, which allowed us to optimally determine the main development steps, localize the weaknesses of the system at the planning stage and improve the understanding of how the system should work. As a result, a functional model consisting of four decomposition levels and six schemes was made.