{"id":3007,"date":"2024-09-17T15:54:51","date_gmt":"2024-09-17T13:54:51","guid":{"rendered":"https:\/\/test.kint.cz\/?p=3007"},"modified":"2025-06-04T19:03:24","modified_gmt":"2025-06-04T17:03:24","slug":"2-4-information-systems-and-technologies","status":"publish","type":"post","link":"https:\/\/test.kint.cz\/en\/2-4-information-systems-and-technologies\/","title":{"rendered":"2.4 Information Systems and Technologies"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"3007\" class=\"elementor elementor-3007\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e20641b e-con-full e-flex e-con e-parent\" data-id=\"e20641b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e937fa5 elementor-widget elementor-widget-heading\" data-id=\"e937fa5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">2.4 Information Systems and Technologies<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-15f76c5 elementor-widget elementor-widget-image\" data-id=\"15f76c5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"750\" height=\"350\" src=\"https:\/\/test.kint.cz\/wp-content\/uploads\/2024\/09\/ecf0fabc-openart-vygeneruj-obrzek-s-pouze-sedmi-prvky-prvky-jsou-interpretace-posloupnosti-_-750x350-1.jpg\" class=\"attachment-large size-large wp-image-1570\" alt=\"\" srcset=\"https:\/\/test.kint.cz\/wp-content\/uploads\/2024\/09\/ecf0fabc-openart-vygeneruj-obrzek-s-pouze-sedmi-prvky-prvky-jsou-interpretace-posloupnosti-_-750x350-1.jpg 750w, https:\/\/test.kint.cz\/wp-content\/uploads\/2024\/09\/ecf0fabc-openart-vygeneruj-obrzek-s-pouze-sedmi-prvky-prvky-jsou-interpretace-posloupnosti-_-750x350-1-300x140.jpg 300w\" sizes=\"(max-width: 750px) 100vw, 750px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c202699 elementor-widget elementor-widget-text-editor\" data-id=\"c202699\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Information, information systems, and technologies encompass a very broad field. Today, information is classified alongside material, energy, and financial resources as one of the fundamental factors determining progress\u2014not only technological but also advancements in other areas of human activity [63,64]. Information flows within systems create essential connections and couplings between elements and entire systems in complex technological structures [10,25,33,63]. Without a certain level of information, it is impossible to create or manage processes in technical works and human society [16].<\/p><p>This dissertation focuses primarily on the traffic management system of the Prague metro and the informational support for enhancing safety through the use of information technologies, i.e., increasing information performance. This ensures accurate and timely decision-making based on the degree of knowledge, which is particularly crucial under abnormal and critical conditions. By doing so, the information performance enhances the safety of the system. The following paragraphs describe the use of information systems, the theory of information generation, the parameters of the applied technologies, the degree of information, information performance, and the security of information systems.<\/p><p>A more detailed description of the issues related to information systems and technologies in the field of technical works safety management can be found in [10,16,65]<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3048e15 elementor-widget elementor-widget-heading\" data-id=\"3048e15\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">2.4.1 The Use of Information Systems in Railways<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1ccfacc elementor-widget elementor-widget-text-editor\" data-id=\"1ccfacc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Information technologies and systems serve as tools for management or, in the case of automated operations, independently manage both qualitative and safety parameters. Information systems and technologies are an integral part of railway systems.<\/p><p>Table 3 presents examples of the use of information systems in various areas of railway transportation, including metro operations, which are the focus of this dissertation, according to [65].<\/p><p>Table 3 Examples of the use of information systems in railways [65]<\/p><figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Area of Application<\/strong><\/td><td><strong>Used for<\/strong><\/td><\/tr><tr><td>Management and Planning<\/td><td>Evaluation of operational data, creation of timetables, staff duty rosters, decision-making, economic, and accounting activities, communication with emergency services and police<\/td><\/tr><tr><td>Traffic Management<\/td><td>Central monitoring and control, dispatcher activities, station and track technologies, data collection and processing along train routes, communication between stationary and onboard systems, signaling equipment<\/td><\/tr><tr><td>Train Operation<\/td><td>Train control, onboard computers, data transmission between onboard devices, monitoring and controlling train systems (doors, air conditioning, train intercom, power systems), interface between technician and train driver<\/td><\/tr><tr><td>Passengers:<\/td><td>Information boards, passenger ticketing systems, onboard entertainment systems, Wi-Fi, navigation systems \u2013 directional signs, systems for the disabled<\/td><\/tr><\/tbody><\/table><\/figure>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-659be87 elementor-widget elementor-widget-text-editor\" data-id=\"659be87\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Table 3 Examples of the Use of Information Systems in Railways [65]<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-27a686d elementor-widget elementor-widget-heading\" data-id=\"27a686d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">2.4.2 The Process of Information Generation<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-35c3061 elementor-widget elementor-widget-text-editor\" data-id=\"35c3061\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The generation of information is conditioned by observing certain properties of the object under observation or shared properties of a group of objects. Every information system monitors the properties of entities using a specific language, which serves to create information about the observed object [64,65]. Depending on how the information obtained is interpreted, different types of information systems are distinguished [64,65]:<\/p><ul><li>syntactic information systems, which create a set of informational representations of the state variables of the observed object,<\/li><li>process information systems, which represent a set of processes<\/li><\/ul><p>Action information systems, through feedback, influence the original observed object [64], [65]. For the purposes of this dissertation and within the scope of railway traffic management, action process information systems are primarily applied.<\/p><p>The process of information generation, the creation of an information system, the process of creating a new object or modifying an object, consists originally of the following subprocesses, or a set of links and their relations [64], as described in Table 4.<\/p><p>Table 4 The Process of Information Generation and Information Technology [65]<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-027ceef e-con-full e-flex e-con e-child\" data-id=\"027ceef\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a95e162 elementor-widget elementor-widget-text-editor\" data-id=\"a95e162\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<table>\n  <tbody>\n    <tr>\n      <td><\/td>\n      <td><strong><em>Subprocess of information generation \/ set of objects<\/em><\/strong><\/td>\n      <td><strong><em>Affected abstract nodes<\/em><\/strong><\/td>\n      <td><strong><em>Used information technologies<\/em><\/strong><\/td>\n      <td><strong><em>Process inputs<\/em><\/strong><\/td>\n      <td><strong><em>Process outputs<\/em><\/strong><\/td>\n    <\/tr>\n    <tr>\n      <td><strong><em>1<\/em><\/strong><\/td>\n      <td>Object identification<\/td>\n      <td>Object, observer<\/td>\n      <td>Physical receptors (sensors, detectors)<\/td>\n      <td>Observed state (physical) variables of the object<\/td>\n      <td>Signals<\/td>\n    <\/tr>\n    <tr>\n      <td><strong><em>2<\/em><\/strong><\/td>\n      <td>Observation<\/td>\n      <td>Observer, language (syntax)<\/td>\n      <td>Sampling, quantification, encoding\/decoding<\/td>\n      <td>Signals<\/td>\n      <td>Data<\/td>\n    <\/tr>\n    <tr>\n      <td><strong><em>3<\/em><\/strong><\/td>\n      <td>Communication between source and recipient of the message<\/td>\n      <td>Language (observer or data collection system), message recipient<\/td>\n      <td>Telecommunication, transmission, and communication systems<\/td>\n      <td>Data<\/td>\n      <td>Data<\/td>\n    <\/tr>\n    <tr>\n      <td><strong><em>4<\/em><\/strong><\/td>\n      <td>Interpretation set, generation of information<\/td>\n      <td>Language (observer or data collection system, or recipient), information set (line 6)<\/td>\n      <td>Ontology, language<\/td>\n      <td>Data<\/td>\n      <td>Information<\/td>\n    <\/tr>\n    <tr>\n      <td><strong><em>5<\/em><\/strong><\/td>\n      <td>Relationships of functions and structural arrangement of the object, verification of integrity<\/td>\n      <td>Information set (line 6), object<\/td>\n      <td>Action element of the system, action information system<\/td>\n      <td>Object, information<\/td>\n      <td>Correctness of information, change of object<\/td>\n    <\/tr>\n    <tr>\n      <td><strong><em>6<\/em><\/strong><\/td>\n      <td>Set of information in the set of information systems<\/td>\n      <td>Information systems<\/td>\n      <td>Information systems<\/td>\n      <td>Information<\/td>\n      <td>Information<\/td>\n    <\/tr>\n    <tr>\n      <td><strong><em>7<\/em><\/strong><\/td>\n      <td>Interpretation process<\/td>\n      <td>Information set (line 6), new object<\/td>\n      <td>Signaling and information representation technologies, artificial intelligence<\/td>\n      <td>Information<\/td>\n      <td>Image of the object, new object<\/td>\n    <\/tr>\n  <\/tbody>\n<\/table>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-17566dd elementor-widget elementor-widget-text-editor\" data-id=\"17566dd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The process of generating an informational image can also be expressed using Frege&#8217;s functional concept of the generation of an informational image [64], which consists of the following sets:<\/p>\n<ul>\n  <li>O<sub>i<\/sub> \u2013 set of state variables on the object,<\/li>\n  <li>P<sub>i<\/sub> \u2013 set of states (observers),<\/li>\n  <li>\u03a6<sub>i<\/sub> \u2013 set of syntactic strings (data flow),<\/li>\n  <li>I<sub>i<\/sub> \u2013 sets of informational images of state variables,<\/li>\n<\/ul>\n<p>and their mutual relationships described in the work [64], which determine the quality of the process of generating the informational image:<\/p>\n<ul>\n  <li>OP \u2013 identification,<\/li>\n  <li>PO \u2013 invasiveness (risk of disruption of the integrity of state variables on the object),<\/li>\n  <li>P\u03a6 \u2013 projection in the set of symbols and syntactic strings,<\/li>\n  <li>\u03a6P \u2013 correction and identification of indeterminacy,<\/li>\n  <li>\u03a6I \u2013 interpretation, generation of information,<\/li>\n  <li>I\u03a6 \u2013 reflection of language constructs,<\/li>\n  <li>IO \u2013 relations of functional and structural arrangement,<\/li>\n  <li>OI \u2013 verification of integrity.<\/li>\n<\/ul>\n<p>From Table 4 and according to the source <a href=\"https:\/\/test.kint.cz\/veda-technika\/integralni-bezpecnost\/integral-safety-definice\/pouzita-literatura-pro-clanky-integralni-bezpecnost\/\">[64]<\/a>, the following definitions can be derived:<\/p>\n<ul>\n  <li><strong><em>data<\/em><\/strong> \u2013 uninterpreted data about the state of the object,<\/li>\n  <li><strong><em>information<\/em><\/strong> \u2013 interpreted data, information, signals leading to a change in the arrangement in real-world systems or consciousness.<\/li>\n<\/ul>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d8caddb elementor-widget elementor-widget-heading\" data-id=\"d8caddb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">2.4.3 Qualitative Properties of Information Systems and Technologies<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-616dfdb elementor-widget elementor-widget-text-editor\" data-id=\"616dfdb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThe qualitative properties of information systems and technologies can be influenced by appropriately setting their parameters, such as the amount of information determined by the number of possible messages limited by the number of characters, and the parameters of the transfer matrix defined by formula (11) below, which determines the system&#8217;s interpretative and filtering ability, communicative capacity, and information throughput\u00a0<a href=\"https:\/\/test.kint.cz\/veda-technika\/integralni-bezpecnost\/integral-safety-definice\/pouzita-literatura-pro-clanky-integralni-bezpecnost\/\">[65].<\/a>\n\nIn practice, it is essential to evaluate the &#8220;size of information&#8221;<a href=\"https:\/\/test.kint.cz\/veda-technika\/integralni-bezpecnost\/integral-safety-definice\/pouzita-literatura-pro-clanky-integralni-bezpecnost\/\">\u00a0[65]<\/a>. The measure of information according to\u00a0<a href=\"https:\/\/test.kint.cz\/veda-technika\/integralni-bezpecnost\/integral-safety-definice\/pouzita-literatura-pro-clanky-integralni-bezpecnost\/\">[64]<\/a>\u00a0is most commonly characterized by Hartley&#8217;s measure of information for a binary symbol system (i.e., for most current cyber-physical systems). It is expressed by the relation:\n\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" class=\"wp-image-1956 lazy loaded\" title=\"2.4 Informa\u010dn\u00ed syst\u00e9my a technologie 1\" src=\"https:\/\/storage.googleapis.com\/stateless-www-kint-cz\/2024\/03\/339baf8e-image.png\" sizes=\"(max-width: 152px) 100vw, 152px\" srcset=\"https:\/\/storage.googleapis.com\/stateless-www-kint-cz\/2024\/03\/339baf8e-image.png 152w, https:\/\/storage.googleapis.com\/stateless-www-kint-cz\/2024\/03\/339baf8e-image-150x58.png 150w\" alt=\"339baf8e image\" width=\"152\" height=\"58\" data-src=\"https:\/\/storage.googleapis.com\/stateless-www-kint-cz\/2024\/03\/339baf8e-image.png\" data-srcset=\"https:\/\/storage.googleapis.com\/stateless-www-kint-cz\/2024\/03\/339baf8e-image.png 152w, https:\/\/storage.googleapis.com\/stateless-www-kint-cz\/2024\/03\/339baf8e-image-150x58.png 150w\" data-sizes=\"(max-width: 152px) 100vw, 152px\" data-was-processed=\"true\" \/><\/figure> (8)\nwhere\u00a0<strong><em>N<\/em><\/strong>\u00a0represents the number of possible messages (data):\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" class=\"wp-image-1957 lazy loaded\" title=\"2.4 Informa\u010dn\u00ed syst\u00e9my a technologie 2\" src=\"https:\/\/storage.googleapis.com\/stateless-www-kint-cz\/2024\/03\/a6bfa155-image.png\" alt=\"a6bfa155 image\" width=\"89\" height=\"41\" data-src=\"https:\/\/storage.googleapis.com\/stateless-www-kint-cz\/2024\/03\/a6bfa155-image.png\" data-was-processed=\"true\" \/><\/figure> (9)\nwhere\u00a0<strong><em>S<\/em><\/strong>\u00a0is the number of characters in the alphabet\u00a0<strong><em>A (A1,A2,\u2026AS)<\/em><\/strong>, and\u00a0<strong><em>n<\/em><\/strong>\u00a0is the number of elements in the set of characters.\n\nProcess information systems are characterized according to\u00a0<a href=\"https:\/\/test.kint.cz\/veda-technika\/integralni-bezpecnost\/integral-safety-definice\/pouzita-literatura-pro-clanky-integralni-bezpecnost\/\">[64]<\/a>\u00a0by graphs assigned to relations:\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-1958 lazy loaded\" title=\"2.4 Informa\u010dn\u00ed syst\u00e9my a technologie 3\" src=\"https:\/\/storage.googleapis.com\/stateless-www-kint-cz\/2024\/03\/395962ad-image.png\" alt=\"395962ad image\" width=\"173\" height=\"42\" data-src=\"https:\/\/storage.googleapis.com\/stateless-www-kint-cz\/2024\/03\/395962ad-image.png\" data-was-processed=\"true\" \/><\/figure> (10)\nwhere\u00a0<strong><em>I<sub>i<\/sub><\/em><\/strong>=1,2&#8230;n represents the informational image of state variables, the set of states\u00a0<strong><em>P<\/em><\/strong>, and syntactic strings (information flows)\u00a0<strong><em>\u03d5<\/em><\/strong>\u00a0over time\u00a0<strong><em>t<\/em><\/strong>.\n\nThe given assignment enables the structural interpretation of complex information systems, evaluation of feedback, and the quality of information transfer and processing in individual information systems\u00a0<a href=\"https:\/\/test.kint.cz\/veda-technika\/integralni-bezpecnost\/integral-safety-definice\/pouzita-literatura-pro-clanky-integralni-bezpecnost\/\">[64]<\/a>, and its information segment is based on matrix representation\u00a0<a href=\"https:\/\/test.kint.cz\/veda-technika\/integralni-bezpecnost\/integral-safety-definice\/pouzita-literatura-pro-clanky-integralni-bezpecnost\/\">[65]<\/a>:\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-1959 lazy loaded\" title=\"2.4 Informa\u010dn\u00ed syst\u00e9my a technologie 4\" src=\"https:\/\/storage.googleapis.com\/stateless-www-kint-cz\/2024\/03\/72973de5-image.png\" alt=\"72973de5 image\" width=\"220\" height=\"85\" data-src=\"https:\/\/storage.googleapis.com\/stateless-www-kint-cz\/2024\/03\/72973de5-image.png\" data-was-processed=\"true\" \/><\/figure> (11)\nwhere\u00a0<strong><em>T<sub>i<\/sub><\/em><\/strong>\u00a0is the transfer matrix of the i-th information segment (i.e., the segment of information performance).\n\nIn a real system, the relationship (10) implies that information or a set of information\u00a0<strong><em>I<sub>i<\/sub><\/em><\/strong>\u00a0is connected to the set of system states and information flows over time. The information segment in relationship (11) can be assigned, for example, to a data collection system, where\u00a0<strong><em>I1<\/em><\/strong>\u00a0represents input (initial) information,\u00a0<strong><em>\u03d5<sub>1<\/sub><\/em><\/strong>\u00a0the input information flow, and on the other side of the system\u00a0<strong><em>I2<\/em><\/strong>\u00a0as the input information and the transferred information flow\u00a0<strong><em>\u03d5<sub>2<\/sub><\/em><\/strong><a href=\"https:\/\/test.kint.cz\/veda-technika\/integralni-bezpecnost\/integral-safety-definice\/pouzita-literatura-pro-clanky-integralni-bezpecnost\/\">[65]<\/a>. Parameters t can be obtained both quantitatively and qualitatively\u00a0<a href=\"https:\/\/test.kint.cz\/veda-technika\/integralni-bezpecnost\/integral-safety-definice\/pouzita-literatura-pro-clanky-integralni-bezpecnost\/\">[63,65]<\/a>, and in the given example according to source [64], they represent:\n\n<strong><em>t<sub>a<\/sub><\/em><\/strong>\u00a0\u2013 interpretative ability (for ta < 1, the system has very low knowledge and interpretative ability, for\u00a0<strong><em>t<sub>a<\/sub><\/em><\/strong>=1, it has the ability to interpret the properties of an object in the information system, and for\u00a0<strong><em>t<sub>a<\/sub>\u00a0> 1<\/em><\/strong>, it represents an expert system with the ability to represent its information about an object based on acquired data),\n\n<strong><em>t<sub>b<\/sub><\/em><\/strong>\u00a0\u2013 filtering ability (in the case of tb < 1, the system interprets less information on its output than it receives on its input information flow, and for tb > 1, the opposite is true),\n\n<strong><em>t<sub>c<\/sub><\/em><\/strong>\u00a0\u2013 communicative ability (the ability to provide output information flow based on input information),\n\n<strong><em>t<sub>d<\/sub><\/em><\/strong>\u00a0\u2013 information system throughput (the ability to convert input information flow to output information flow; in the case of redundancy, td is much greater than 1).\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-55dc2f9 elementor-widget elementor-widget-heading\" data-id=\"55dc2f9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">2.4.4 Information Performance and Its Relationship to Safety\n\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5e43b8a elementor-widget elementor-widget-text-editor\" data-id=\"5e43b8a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tTo ensure the safety of a system of systems, it is crucial to create such couplings between systems that provide a high level of connection quality, i.e., qualitative system parameters <a href=\"https:\/\/test.kint.cz\/veda-technika\/integralni-bezpecnost\/integral-safety-definice\/pouzita-literatura-pro-clanky-integralni-bezpecnost\/\">[65]<\/a>, which according to <a href=\"https:\/\/test.kint.cz\/veda-technika\/integralni-bezpecnost\/integral-safety-definice\/pouzita-literatura-pro-clanky-integralni-bezpecnost\/\">[25,63]<\/a>, include:\n\n<ul> <li>safety at the system-of-systems level,<\/li> <li>integrity of measures,<\/li> <li>system-of-systems reliability,<\/li> <li>quality of active and passive measures enhancing the safety of individual systems,<\/li> <li>availability of a specific system or device whenever needed,<\/li> <li>continuity of the measure application process,<\/li> <li>accuracy in measure execution.<\/li> <\/ul>\nThese system parameters are directly dependent on the effectiveness of information systems that ensure the required accuracy and timeliness of information, and in the case of action information systems, also the speed of correct decision-making. The effectiveness level of an information system is expressed by the quantity of information performance <a href=\"https:\/\/test.kint.cz\/veda-technika\/integralni-bezpecnost\/integral-safety-definice\/pouzita-literatura-pro-clanky-integralni-bezpecnost\/\">[63-65]<\/a>:\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-1960 lazy loaded\" title=\"2.4 Information Systems and Technologies 5\" src=\"https:\/\/storage.googleapis.com\/stateless-www-kint-cz\/2024\/03\/6e48f577-image.png\" alt=\"6e48f577 image\" width=\"192\" height=\"35\" data-src=\"https:\/\/storage.googleapis.com\/stateless-www-kint-cz\/2024\/03\/6e48f577-image.png\" data-was-processed=\"true\" \/><\/figure> (12)\nwhere <strong><em>P<sub>i<\/sub>(t)<\/em><\/strong> is the instantaneous information performance <a href=\"https:\/\/test.kint.cz\/veda-technika\/integralni-bezpecnost\/integral-safety-definice\/pouzita-literatura-pro-clanky-integralni-bezpecnost\/\">[63-65]<\/a>. Information performance <strong><em>P<\/em><\/strong> represents the content of the transmitted decoded message <strong><em>I<\/em><\/strong> in the information flow <strong><em>\u03a6<\/em><\/strong>. Information performance also equals the extent of uncertainty reduction <strong><em>E<\/em><\/strong> in knowledge (i.e., the physical quantity of work) per unit of time <strong><em>t<\/em><\/strong> <a href=\"https:\/\/test.kint.cz\/veda-technika\/integralni-bezpecnost\/integral-safety-definice\/pouzita-literatura-pro-clanky-integralni-bezpecnost\/\">[64]<\/a>:\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-1962 lazy loaded\" title=\"2.4 Information Systems and Technologies 6\" src=\"https:\/\/storage.googleapis.com\/stateless-www-kint-cz\/2024\/03\/05440be6-image.png\" alt=\"05440be6 image\" width=\"142\" height=\"46\" data-src=\"https:\/\/storage.googleapis.com\/stateless-www-kint-cz\/2024\/03\/05440be6-image.png\" data-was-processed=\"true\" \/><\/figure> (13)\nFor complex systems, due to the heterogeneity of information types (quantity, content, accuracy, validity), it is difficult to clearly quantify information performance. Therefore, it is essential to continuously improve information performance to ensure the highest quality level of control system functionality <a href=\"https:\/\/test.kint.cz\/veda-technika\/integralni-bezpecnost\/integral-safety-definice\/pouzita-literatura-pro-clanky-integralni-bezpecnost\/\">[63-65]<\/a>. Several methods are used in practice to enhance information performance and minimize resources needed for system development, including <a href=\"https:\/\/test.kint.cz\/veda-technika\/integralni-bezpecnost\/integral-safety-definice\/pouzita-literatura-pro-clanky-integralni-bezpecnost\/\">[63-65]<\/a>:\n\n<ul> <li>COBIT for auditing information systems from the perspective of executive management <a href=\"https:\/\/test.kint.cz\/veda-technika\/integralni-bezpecnost\/integral-safety-definice\/pouzita-literatura-pro-clanky-integralni-bezpecnost\/\">[66]<\/a>,<\/li> <li>ITIL for managing information systems and services,<\/li> <li>refactoring, i.e., changes to the software system that improve its internal structure and resource utilization without affecting its external functional behavior <a href=\"https:\/\/test.kint.cz\/veda-technika\/integralni-bezpecnost\/integral-safety-definice\/pouzita-literatura-pro-clanky-integralni-bezpecnost\/\">[64]<\/a>.<\/li> <\/ul>\nTo ensure the safety of control systems, it is therefore important to operate information systems that provide the fastest and most accurate decisions, which are closely linked to information performance <a href=\"https:\/\/test.kint.cz\/veda-technika\/integralni-bezpecnost\/integral-safety-definice\/pouzita-literatura-pro-clanky-integralni-bezpecnost\/\">[64]<\/a>.\n\nThe probability of choosing the correct alternative solution from a set of solutions and the probability of correct decision-making in control system operation, i.e., PCD (Probability of Proper Decision), is determined by a function dependent on the level of knowledge of the function \u201ck\u201d and the information flow over time \u201c<strong><em>\u03a6 ( t )<\/em><\/strong>\u201d <a href=\"https:\/\/test.kint.cz\/veda-technika\/integralni-bezpecnost\/integral-safety-definice\/pouzita-literatura-pro-clanky-integralni-bezpecnost\/\">[63-65]<\/a>:\n\n<strong><em>CD = F [ \u03a6 ( t ), k ].<\/em><\/strong>\n\n(14)\n\nThus, control systems relying on a higher level of knowledge can make faster correct decisions with less load, i.e., they decide faster <a href=\"https:\/\/test.kint.cz\/veda-technika\/integralni-bezpecnost\/integral-safety-definice\/pouzita-literatura-pro-clanky-integralni-bezpecnost\/\">[65]<\/a>.\n\nProperly selected parameters of information technologies and systems ensure their information performance, i.e., the quality of information that enables effective system responses to potential undesirable conditions. This improves railway safety not only under normal conditions but also under abnormal and especially critical conditions <a href=\"https:\/\/test.kint.cz\/veda-technika\/integralni-bezpecnost\/integral-safety-definice\/pouzita-literatura-pro-clanky-integralni-bezpecnost\/\">[63,65]<\/a>.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7c6f774 elementor-widget elementor-widget-heading\" data-id=\"7c6f774\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">2.4.5 Quality of the Transmission System<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c00281a elementor-widget elementor-widget-text-editor\" data-id=\"c00281a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tGiven the nature of the task addressed in this work, specifically a distributed transportation system with geographically distant system nodes, it is appropriate to present the relationships describing the quality of information transfer within the transmission environment (Process 3 according to Table 4). Let us consider a feedback control system represented in Figure 8, in accordance with <a href=\"https:\/\/test.kint.cz\/veda-technika\/integralni-bezpecnost\/integral-safety-definice\/pouzita-literatura-pro-clanky-integralni-bezpecnost\/\">[10,67,68]<\/a>.  \t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1e1c3fc elementor-widget elementor-widget-image\" data-id=\"1e1c3fc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"541\" height=\"205\" src=\"https:\/\/test.kint.cz\/wp-content\/uploads\/2024\/09\/ea0b7c8c-image.png\" class=\"attachment-large size-large wp-image-1573\" alt=\"\" srcset=\"https:\/\/test.kint.cz\/wp-content\/uploads\/2024\/09\/ea0b7c8c-image.png 541w, https:\/\/test.kint.cz\/wp-content\/uploads\/2024\/09\/ea0b7c8c-image-300x114.png 300w\" sizes=\"(max-width: 541px) 100vw, 541px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b7a1760 elementor-widget elementor-widget-heading\" data-id=\"b7a1760\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">**Figure 8. Connections of the control system in a cybernetic system according to [68].**<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2eee934 e-flex e-con-boxed e-con e-parent\" data-id=\"2eee934\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-868489d elementor-widget elementor-widget-text-editor\" data-id=\"868489d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThe quality of the functionality of the mentioned cybernetic system is therefore influenced by two main factors <a href=\"https:\/\/test.kint.cz\/veda-technika\/integralni-bezpecnost\/integral-safety-definice\/pouzita-literatura-pro-clanky-integralni-bezpecnost\/\">[10]<\/a>:\n\n<ul> <li>the correct behavior of the system and the control center,<\/li> <li>the correct data transmission between the nodes of the cybernetic system.<\/li> <\/ul>\nFor an exact mathematical description of both factors, i.e. the individual communication channel and the entire cybernetic system, we will use the model of the Gaussian transmission channel <a href=\"https:\/\/test.kint.cz\/veda-technika\/integralni-bezpecnost\/integral-safety-definice\/pouzita-literatura-pro-clanky-integralni-bezpecnost\/\">[69]<\/a> and Bayes&#8217; theory (conditional probability theory) <a href=\"https:\/\/test.kint.cz\/veda-technika\/integralni-bezpecnost\/integral-safety-definice\/pouzita-literatura-pro-clanky-integralni-bezpecnost\/\">[10,23]<\/a>.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-18aa41d elementor-widget elementor-widget-image\" data-id=\"18aa41d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"404\" height=\"58\" src=\"https:\/\/test.kint.cz\/wp-content\/uploads\/2024\/09\/4a773d70-image.png\" class=\"attachment-large size-large wp-image-1574\" alt=\"\" srcset=\"https:\/\/test.kint.cz\/wp-content\/uploads\/2024\/09\/4a773d70-image.png 404w, https:\/\/test.kint.cz\/wp-content\/uploads\/2024\/09\/4a773d70-image-300x43.png 300w\" sizes=\"(max-width: 404px) 100vw, 404px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Figure 9. Gaussian transmission channel [69].<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-283d81e elementor-widget elementor-widget-text-editor\" data-id=\"283d81e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tFor a memoryless communication channel (regardless of the output at a time smaller than point t) according to <a href=\"https:\/\/test.kint.cz\/veda-technika\/integralni-bezpecnost\/integral-safety-definice\/pouzita-literatura-pro-clanky-integralni-bezpecnost\/\">[10]<\/a>, the following applies:\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-1965 lazy loaded\" title=\"2.4 Informa\u010dn\u00ed syst\u00e9my a technologie 7\" src=\"https:\/\/storage.googleapis.com\/stateless-www-kint-cz\/2024\/03\/cd706cee-image.png\" sizes=\"(max-width: 154px) 100vw, 154px\" srcset=\"https:\/\/storage.googleapis.com\/stateless-www-kint-cz\/2024\/03\/cd706cee-image.png 154w, https:\/\/storage.googleapis.com\/stateless-www-kint-cz\/2024\/03\/cd706cee-image-150x38.png 150w\" alt=\"cd706cee image\" width=\"154\" height=\"38\" data-src=\"https:\/\/storage.googleapis.com\/stateless-www-kint-cz\/2024\/03\/cd706cee-image.png\" data-srcset=\"https:\/\/storage.googleapis.com\/stateless-www-kint-cz\/2024\/03\/cd706cee-image.png 154w, https:\/\/storage.googleapis.com\/stateless-www-kint-cz\/2024\/03\/cd706cee-image-150x38.png 150w\" data-sizes=\"(max-width: 154px) 100vw, 154px\" data-was-processed=\"true\" \/><\/figure> (15)\nFor a communication channel with memory (e.g., a channel with feedback), with data until time <strong><em>M<\/em><\/strong>, according to <a href=\"https:\/\/test.kint.cz\/veda-technika\/integralni-bezpecnost\/integral-safety-definice\/pouzita-literatura-pro-clanky-integralni-bezpecnost\/\">[10]<\/a>, the following applies:\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-1966 lazy loaded\" title=\"2.4 Informa\u010dn\u00ed syst\u00e9my a technologie 8\" src=\"https:\/\/storage.googleapis.com\/stateless-www-kint-cz\/2024\/03\/a9986c7d-image.png\" sizes=\"(max-width: 394px) 100vw, 394px\" srcset=\"https:\/\/storage.googleapis.com\/stateless-www-kint-cz\/2024\/03\/a9986c7d-image.png 394w, https:\/\/storage.googleapis.com\/stateless-www-kint-cz\/2024\/03\/a9986c7d-image-300x29.png 300w\" alt=\"a9986c7d image\" width=\"394\" height=\"38\" data-src=\"https:\/\/storage.googleapis.com\/stateless-www-kint-cz\/2024\/03\/a9986c7d-image.png\" data-srcset=\"https:\/\/storage.googleapis.com\/stateless-www-kint-cz\/2024\/03\/a9986c7d-image.png 394w, https:\/\/storage.googleapis.com\/stateless-www-kint-cz\/2024\/03\/a9986c7d-image-300x29.png 300w\" data-sizes=\"(max-width: 394px) 100vw, 394px\" data-was-processed=\"true\" \/><\/figure> (16)\nFor the cybernetic system described in Figure 8 with parameters\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-1967 lazy loaded\" title=\"2.4 Informa\u010dn\u00ed syst\u00e9my a technologie 9\" src=\"https:\/\/storage.googleapis.com\/stateless-www-kint-cz\/2024\/03\/5fa530b9-image.png\" alt=\"5fa530b9 image\" width=\"149\" height=\"39\" data-src=\"https:\/\/storage.googleapis.com\/stateless-www-kint-cz\/2024\/03\/5fa530b9-image.png\" data-was-processed=\"true\" \/><\/figure> <strong> <\/strong> the following relationships were referenced in <a href=\"https:\/\/test.kint.cz\/veda-technika\/integralni-bezpecnost\/integral-safety-definice\/pouzita-literatura-pro-clanky-integralni-bezpecnost\/\">[10]<\/a>: <ul> <li>system:<\/li> <\/ul> <figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-1968 lazy loaded\" title=\"2.4 Informa\u010dn\u00ed syst\u00e9my a technologie 10\" src=\"https:\/\/storage.googleapis.com\/stateless-www-kint-cz\/2024\/03\/0c58e70b-image.png\" sizes=\"(max-width: 440px) 100vw, 440px\" srcset=\"https:\/\/storage.googleapis.com\/stateless-www-kint-cz\/2024\/03\/0c58e70b-image.png 440w, https:\/\/storage.googleapis.com\/stateless-www-kint-cz\/2024\/03\/0c58e70b-image-300x25.png 300w\" alt=\"0c58e70b image\" width=\"440\" height=\"36\" data-src=\"https:\/\/storage.googleapis.com\/stateless-www-kint-cz\/2024\/03\/0c58e70b-image.png\" data-srcset=\"https:\/\/storage.googleapis.com\/stateless-www-kint-cz\/2024\/03\/0c58e70b-image.png 440w, https:\/\/storage.googleapis.com\/stateless-www-kint-cz\/2024\/03\/0c58e70b-image-300x25.png 300w\" data-sizes=\"(max-width: 440px) 100vw, 440px\" data-was-processed=\"true\" \/><\/figure> (17) <ul> <li>control center:<\/li> <\/ul> <figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-1969 lazy loaded\" title=\"2.4 Informa\u010dn\u00ed syst\u00e9my a technologie 11\" src=\"https:\/\/storage.googleapis.com\/stateless-www-kint-cz\/2024\/03\/674193d5-image.png\" sizes=\"(max-width: 474px) 100vw, 474px\" srcset=\"https:\/\/storage.googleapis.com\/stateless-www-kint-cz\/2024\/03\/674193d5-image.png 474w, https:\/\/storage.googleapis.com\/stateless-www-kint-cz\/2024\/03\/674193d5-image-300x27.png 300w\" alt=\"674193d5 image\" width=\"474\" height=\"43\" data-src=\"https:\/\/storage.googleapis.com\/stateless-www-kint-cz\/2024\/03\/674193d5-image.png\" data-srcset=\"https:\/\/storage.googleapis.com\/stateless-www-kint-cz\/2024\/03\/674193d5-image.png 474w, https:\/\/storage.googleapis.com\/stateless-www-kint-cz\/2024\/03\/674193d5-image-300x27.png 300w\" data-sizes=\"(max-width: 474px) 100vw, 474px\" data-was-processed=\"true\" \/><\/figure> (18) <ul> <li>communication environment A:<\/li> <\/ul> <figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-1970 lazy loaded\" title=\"2.4 Informa\u010dn\u00ed syst\u00e9my a technologie 12\" src=\"https:\/\/storage.googleapis.com\/stateless-www-kint-cz\/2024\/03\/19ee422c-image.png\" sizes=\"(max-width: 277px) 100vw, 277px\" srcset=\"https:\/\/storage.googleapis.com\/stateless-www-kint-cz\/2024\/03\/19ee422c-image.png 277w, https:\/\/storage.googleapis.com\/stateless-www-kint-cz\/2024\/03\/19ee422c-image-270x39.png 270w\" alt=\"19ee422c image\" width=\"277\" height=\"39\" data-src=\"https:\/\/storage.googleapis.com\/stateless-www-kint-cz\/2024\/03\/19ee422c-image.png\" data-srcset=\"https:\/\/storage.googleapis.com\/stateless-www-kint-cz\/2024\/03\/19ee422c-image.png 277w, https:\/\/storage.googleapis.com\/stateless-www-kint-cz\/2024\/03\/19ee422c-image-270x39.png 270w\" data-sizes=\"(max-width: 277px) 100vw, 277px\" data-was-processed=\"true\" \/><\/figure> (19) <ul> <li>communication environment B:<\/li> <\/ul> <figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-1972 lazy loaded\" title=\"2.4 Informa\u010dn\u00ed syst\u00e9my a technologie 13\" src=\"https:\/\/storage.googleapis.com\/stateless-www-kint-cz\/2024\/03\/1ce90d88-image-1.png\" sizes=\"(max-width: 273px) 100vw, 273px\" srcset=\"https:\/\/storage.googleapis.com\/stateless-www-kint-cz\/2024\/03\/1ce90d88-image-1.png 273w, https:\/\/storage.googleapis.com\/stateless-www-kint-cz\/2024\/03\/1ce90d88-image-1-270x46.png 270w\" alt=\"1ce90d88 image 1\" width=\"273\" height=\"46\" data-src=\"https:\/\/storage.googleapis.com\/stateless-www-kint-cz\/2024\/03\/1ce90d88-image-1.png\" data-srcset=\"https:\/\/storage.googleapis.com\/stateless-www-kint-cz\/2024\/03\/1ce90d88-image-1.png 273w, https:\/\/storage.googleapis.com\/stateless-www-kint-cz\/2024\/03\/1ce90d88-image-1-270x46.png 270w\" data-sizes=\"(max-width: 273px) 100vw, 273px\" data-was-processed=\"true\" \/><\/figure> (20)\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5068e30 elementor-widget elementor-widget-heading\" data-id=\"5068e30\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">2.4.6 Cyber-Physical Systems Security<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fa169c5 elementor-widget elementor-widget-text-editor\" data-id=\"fa169c5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tParallel to the increase in information performance, in practice, and especially in the case of critical infrastructure, the demands on security and protection also increase. The security of cyber-physical systems lies in securing the system&#8217;s information so that the controlled system can perform its functions safely, i.e., that its malfunctions do not endanger itself or its surroundings. The process of ensuring information security (i.e., its protection) involves protecting critical assets of the cyber (information) system so that the required level of availability, integrity, and confidentiality (known in English as CIA \u2013 Confidentiality, Integrity, Availability) is ensured for important information\u00a0<a href=\"https:\/\/test.kint.cz\/veda-technika\/integralni-bezpecnost\/integral-safety-definice\/pouzita-literatura-pro-clanky-integralni-bezpecnost\/\">[52,65]<\/a>. Unlike the system approach described in the previous chapter, from the perspective of information technology, ensuring CIA according to\u00a0<a href=\"https:\/\/test.kint.cz\/veda-technika\/integralni-bezpecnost\/integral-safety-definice\/pouzita-literatura-pro-clanky-integralni-bezpecnost\/\">[52]<\/a> means ensuring:\n\n<ul> <li>Confidentiality \u2013 information is not available or revealed to unauthorized individuals, entities, or processes,<\/li> <li>Integrity \u2013 information is complete and accurate,<\/li> <li>Availability \u2013 accessibility and usability of information always upon request by an authorized entity.<\/li> <\/ul>\nAvailability and integrity can be expressed, for example, using probabilistic parameters in relationships (15) to (20) presented above.\n\nConfidentiality includes additional attributes and methods for ensuring it. Often, these methods are in contrast to ensuring availability and integrity because ensuring confidentiality increases, for example, the time requirements for encoding and decoding, transmission, authentication, and similar processes\u00a0<a href=\"https:\/\/test.kint.cz\/veda-technika\/integralni-bezpecnost\/integral-safety-definice\/pouzita-literatura-pro-clanky-integralni-bezpecnost\/\">[52,65]<\/a>. In the case of process information systems in transportation that operate in real-time, compared to other information systems, the primary requirements are for availability and integrity, whereas confidentiality is not as high a priority\u00a0<a href=\"https:\/\/test.kint.cz\/veda-technika\/integralni-bezpecnost\/integral-safety-definice\/pouzita-literatura-pro-clanky-integralni-bezpecnost\/\">[52,65]<\/a>.\n\nTo ensure the quality, information performance, and security of cyber systems, approaches from process and project management such as TQM\u00a0<a href=\"https:\/\/test.kint.cz\/veda-technika\/integralni-bezpecnost\/integral-safety-definice\/pouzita-literatura-pro-clanky-integralni-bezpecnost\/\">[8]<\/a> are applied, from which the methodologies and international and European standards for management systems\u00a0<a href=\"https:\/\/test.kint.cz\/veda-technika\/integralni-bezpecnost\/integral-safety-definice\/pouzita-literatura-pro-clanky-integralni-bezpecnost\/\">[10,63,65]<\/a> are derived. The purpose of these management systems is to find economically efficient processes that ensure a certain level of quality and security for cyber-physical systems, particularly in the phases of their design, analysis, development, operation, and recovery and disposal.\n\nEach system operates correctly only under certain conditions, i.e., surrounding conditions. Therefore, cyber-physical systems must have certain limits and conditions established that condition their qualitative parameters (i.e., safety, reliability, availability, integrity, continuity, and accuracy)\u00a0<a href=\"https:\/\/test.kint.cz\/veda-technika\/integralni-bezpecnost\/integral-safety-definice\/pouzita-literatura-pro-clanky-integralni-bezpecnost\/\">[22,41]<\/a>.\n\nThe design of the process model for securing cyber-physical systems is presented, for example, in\u00a0sources<a href=\"https:\/\/test.kint.cz\/veda-technika\/integralni-bezpecnost\/integral-safety-definice\/pouzita-literatura-pro-clanky-integralni-bezpecnost\/\">\u00a0[10,63,65,70,71]<\/a>.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>2.4 Information Systems and Technologies Information, information systems, and technologies encompass a very broad field. Today, information is classified alongside [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1570,"comment_status":"open","ping_status":"open","sticky":false,"template":"elementor_header_footer","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[252],"tags":[],"class_list":["post-3007","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-integral-security"],"_links":{"self":[{"href":"https:\/\/test.kint.cz\/en\/wp-json\/wp\/v2\/posts\/3007","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/test.kint.cz\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/test.kint.cz\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/test.kint.cz\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/test.kint.cz\/en\/wp-json\/wp\/v2\/comments?post=3007"}],"version-history":[{"count":37,"href":"https:\/\/test.kint.cz\/en\/wp-json\/wp\/v2\/posts\/3007\/revisions"}],"predecessor-version":[{"id":3048,"href":"https:\/\/test.kint.cz\/en\/wp-json\/wp\/v2\/posts\/3007\/revisions\/3048"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/test.kint.cz\/en\/wp-json\/wp\/v2\/media\/1570"}],"wp:attachment":[{"href":"https:\/\/test.kint.cz\/en\/wp-json\/wp\/v2\/media?parent=3007"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/test.kint.cz\/en\/wp-json\/wp\/v2\/categories?post=3007"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/test.kint.cz\/en\/wp-json\/wp\/v2\/tags?post=3007"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}