Comparison of Information Security Systems for Asymptotic Information Security Management Critical Information Infrastructures

被引:0
|
作者
Erokhin, Sergey [1 ]
Petukhov, Andrey [1 ]
Pilyugin, Pavel [1 ]
机构
[1] Moscow Tech Univ Commun & Informat, Moscow, Russia
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The article reviews the options for critical information infrastructures (CII) protection management and discusses approaches to developing security policies that don't lean on assessing residual risks and identifying a fixed list of threats. We examine and substantiate the possibility of building information security management systems based on monitoring of security events. A formal description of security events as well as relevant protection methods is proposed. The paper introduces an order relation for information security systems comparison and asymptotic CII security control implementation paper.
引用
收藏
页码:89 / 95
页数:7
相关论文
共 50 条
  • [11] Information systems security metrics management
    Kovacich, G
    [J]. COMPUTERS & SECURITY, 1997, 16 (07) : 610 - 618
  • [12] Security management for radiological information systems
    Caramella, D
    Braccini, G
    Fabbrini, F
    Montanari, S
    Neri, E
    [J]. CAR '97 - COMPUTER ASSISTED RADIOLOGY AND SURGERY, 1997, 1134 : 1011 - 1011
  • [13] Security of Data and Information in Vessel Traffic Management Information Systems
    Ristov, Panco
    Mrvica, Ante
    Komadina, Pavao
    [J]. NASE MORE, 2016, 63 (01): : 1 - 8
  • [14] Information systems resources and information security
    Chang, Kuo-chung
    Wang, Chih-ping
    [J]. INFORMATION SYSTEMS FRONTIERS, 2011, 13 (04) : 579 - 593
  • [15] Information systems resources and information security
    Kuo-chung Chang
    Chih-ping Wang
    [J]. Information Systems Frontiers, 2011, 13 : 579 - 593
  • [16] Critical Information Infrastructures Management System and Security Issues Focusing on the Public Administrative Sector
    Heo, Jun
    Yi, Wan Suk
    [J]. SERVICE COMPUTATION 2010: THE SECOND INTERNATIONAL CONFERENCES ON ADVANCED SERVICE COMPUTING, 2010, : 179 - 183
  • [17] Information systems security in the information systems curriculum
    Eastman, C
    Farkas, C
    [J]. INFORMATION TECHNOLOGY AND ORGANIZATIONS: TRENDS, ISSUES, CHALLENGES AND SOLUTIONS, VOLS 1 AND 2, 2003, : 117 - 118
  • [18] Security of information in IT systems
    Kaliczynska, M
    [J]. Photonics Applications in Astronomy, Communications, Industry, and High-Energy Physics Experiments III, 2005, 5775 : 571 - 576
  • [19] INFORMATION SECURITY AND QUALITY MANAGEMENT SYSTEMS INTEGRATION: CHALLENGES AND CRITICAL FACTORS
    Fiore, Ana P. A.
    Facin, Ana L. F.
    Muniz, Jorge
    [J]. INTERNATIONAL JOURNAL FOR QUALITY RESEARCH, 2023, 17 (03) : 635 - 650
  • [20] Blockchain Based Sharing of Security Information for Critical Infrastructures of the Finance Sector
    Karagiannis, Ioannis
    Mavrogiannis, Konstantinos
    Soldatos, John
    Drakoulis, Dimitris
    Troiano, Ernesto
    Polyviou, Ariana
    [J]. COMPUTER SECURITY: ESORICS 2019 INTERNATIONAL WORKSHOPS, IOSEC, MSTEC, AND FINSEC, 2020, 11981 : 226 - 241