Comparison of Information Security Systems for Asymptotic Information Security Management Critical Information Infrastructures

被引:0
|
作者
Erokhin, Sergey [1 ]
Petukhov, Andrey [1 ]
Pilyugin, Pavel [1 ]
机构
[1] Moscow Tech Univ Commun & Informat, Moscow, Russia
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The article reviews the options for critical information infrastructures (CII) protection management and discusses approaches to developing security policies that don't lean on assessing residual risks and identifying a fixed list of threats. We examine and substantiate the possibility of building information security management systems based on monitoring of security events. A formal description of security events as well as relevant protection methods is proposed. The paper introduces an order relation for information security systems comparison and asymptotic CII security control implementation paper.
引用
收藏
页码:89 / 95
页数:7
相关论文
共 50 条
  • [1] Approach to security assessment of critical infrastructures' information systems
    Leszczyna, R.
    Fovino, I. N.
    Masera, M.
    [J]. IET INFORMATION SECURITY, 2011, 5 (03) : 135 - 144
  • [2] Emergent information security in critical infrastructures
    Daskapan, Semir
    Vree, Willem G.
    Wagenaar, Rene W.
    [J]. INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURES, 2006, 2 (2-3) : 247 - 260
  • [3] Critical Information Infrastructures Security Modeling
    Erokhin, Sergey
    Petukhov, Andrey
    Pilyugin, Pavel
    [J]. PROCEEDINGS OF THE 24TH CONFERENCE OF OPEN INNOVATIONS ASSOCIATION (FRUCT), 2019, : 82 - 88
  • [4] ARCHITECTURAL MODEL FOR INFORMATION SECURITY ANALYSIS OF CRITICAL INFORMATION INFRASTRUCTURES
    Ma, Zhendong
    Smith, Paul
    Skopik, Florian
    [J]. IDIMT-2013: INFORMATION TECHNOLOGY HUMAN VALUES, INNOVATION AND ECONOMY, 2013, 42 : 197 - 204
  • [5] Security Strategy Analysis for Critical Information Infrastructures
    Manuel Torres, Jose
    Olav Sveen, Finn
    Maria Sarriegi, Jose
    [J]. CRITICAL INFORMATION INFRASTRUCTURES SECURITY, 2009, 5508 : 247 - 257
  • [6] Information Security Risk Management in Critical Informative Systems
    Kiran, K. V. D.
    Reddy, L. S. S.
    Kumar, Velagapudi Pavan
    Dheeraj, Kalluri Krishna Sai
    [J]. 2014 CONFERENCE ON IT IN BUSINESS, INDUSTRY AND GOVERNMENT (CSIBIG), 2014,
  • [7] Security Information and Event Management (SIEM): Analysis, Trends, and Usage in Critical Infrastructures
    Gonzalez-Granadillo, Gustavo
    Gonzalez-Zarzosa, Susana
    Diaz, Rodrigo
    [J]. SENSORS, 2021, 21 (14)
  • [8] Organizational Information Security Management for Sustainable Information Systems: An Unethical Employee Information Security Behavior Perspective
    Chu, Amanda M. Y.
    So, Mike K. P.
    [J]. SUSTAINABILITY, 2020, 12 (08)
  • [9] The Invisible Hand? Critical Information Infrastructures, Commercialisation and National Security
    Newlove-Eriksson, Lindy
    Giacomello, Giampiero
    Eriksson, Johan
    [J]. INTERNATIONAL SPECTATOR, 2018, 53 (02): : 124 - 140
  • [10] Security management: An information systems setting
    Warren, MJ
    Batten, LM
    [J]. INFORMATION SECURITY AND PRIVACY, 2002, 2384 : 257 - 270