1. MUHAMMAD TAHIR - Department of Software Engineering, Superior University Lahore, Pakistan,
2. MUHAMMAD RAHIM ZAFAR - Department of Software Engineering, Superior University Lahore, Pakistan.
3. FAHAD NAZIR - Department of Software Engineering, Superior University Lahore, Pakistan.
4. SALEEM ZUBAIR - Department of Computer Science, Superior University Lahore, Pakistan.
5. MUHAMMAD WASEEM IQBAL - Associate Professor, Department of Software Engineering, Superior University Lahore, Pakistan.
Intelligent systems are evolving computer systems based on intelligent approaches that allow continuous monitoring and management of industrial activities. Intelligence improves an individual's ability to make smarter decisions. This study presents a proposed architecture of intelligent systems for information security management. This system intends to enhance security management activities such as monitoring, regulating, and decision-making with an effect size greater than one expert in security by providing techniques to boost the active generation of information about threats, policies, procedures, and risks. Main concern is requirements issues and design for the core components of the intelligent system. There have been several studies that examine management's responsibilities, but none of them have provided a comprehensive picture of what it takes to manage information security. Therefore, managers should research and familiarize themselves with the many responsibilities of management in order to take a more well-rounded approach to information security management. This research investigates the various responsibilities of management in information security and to identify ways in which management may better ensure the safety of sensitive data. The quality of information security management was significantly impacted by a few different management activities. Information security, education, compliance training, corporate information architecture, IT infrastructure management, business and IT alignment, and human resource management were all on the list of responsibilities. So, this study adds to the literature by advocating for a more holistic approach to information security and by identifying actions that managers may do to aid in this area. Many fresh avenues for investigation into the topic have been uncovered by this study.
Software architecture, Architecture design, Architecture Issues, Architectural Challenge.