AnalysisofStronglyandWeaklyCoupledManagemntSystemsinInformationSecurity