The Automating Process of Information Security Management

被引:0
|
作者
Sokolov, Sergey S. [1 ]
Alimov, Oleg M. [1 ]
Golubeva, Mariy G. [1 ]
Burlov, Vyacheslav G. [1 ]
Vikhrov, Nikolai M. [1 ]
机构
[1] Admiral Makarov State Univ Maritime & Inland Ship, Chair Comprehens Informat Secur, St Petersburg, Russia
关键词
information security; incident management; information protection; information system; maturity model;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This article is devoted to the review and analysis of existing methods for ensuring information security of automated systems for the banking sector. Strengths and weaknesses were investigated. In particular, the introduction system of information security management will help to fulfill a significant part of the requirements of the group standards for information security ISO/IEC 27000 part of PCI DSS requirements and standards of the Bank of Russia, as well as its regulations and guidelines, requirements for the establishment of a subsystem of registration and accounting systems for the protection of personal data and key systems (the requirements of FSTEC of Russia).
引用
收藏
页码:124 / 127
页数:4
相关论文
共 50 条
  • [1] A process framework for information security management
    Haufe, Knut
    Colomo-Palacios, Ricardo
    Dzombeta, Srdan
    Brandis, Knud
    Stantchev, Vladimir
    [J]. IJISPM-INTERNATIONAL JOURNAL OF INFORMATION SYSTEMS AND PROJECT MANAGEMENT, 2016, 4 (04): : 27 - 47
  • [2] A PROCESS APPROACH TO INFORMATION SECURITY MANAGEMENT
    VONSOLMS, R
    VONSOLMS, SH
    CARROLL, JM
    [J]. COMPUTER SECURITY, 1993, 37 : 385 - 399
  • [3] Automating Information Security Policy Compliance Checking
    Mandal, Debashis
    Mazumdar, Chandan
    [J]. PROCEEDINGS OF 2018 FIFTH INTERNATIONAL CONFERENCE ON EMERGING APPLICATIONS OF INFORMATION TECHNOLOGY (EAIT), 2018,
  • [4] A Comparison between Business Process Management and Information Security Management
    Wangen, Gaute
    Snekkenes, Einar Arthur
    [J]. FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2014, 2014, 2 : 901 - 910
  • [5] An Information Security Management Approach for an Electoral Process in Ecuador
    Toapanta Toapanta, Segundo Moises
    Valero Carrillo, Andrea Paola
    Naranjo Sanchez, Bertha Alice
    Mafia Gallegos, Luis Enrique
    [J]. FUZZY SYSTEMS AND DATA MINING V (FSDM 2019), 2019, 320 : 921 - 932
  • [6] A meta-process for information security risk management
    Papadaki, Katerina
    Polemi, Nineta
    Damilos, Dimitrios Konnos
    [J]. GLOBAL E-SECURITY, PROCEEDINGS, 2008, 12 : 257 - +
  • [7] A meta-process for information security risk management
    Papadaki, Katerina
    Polemi, Despina
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2008, 1 (04) : 336 - 343
  • [8] A Risk Management Process for Consumers: The Next Step in Information Security
    van Cleeff, Andre
    [J]. NEW SECURITY PARADIGMS WORKSHOP 2010, 2010, : 107 - 114
  • [9] Designing a Process Reference Model for Information Security Management Systems
    Mangin, Olivier
    Barafort, Beatrix
    Heymans, Patrick
    Dubois, Eric
    [J]. SOFTWARE PROCESS IMPROVEMENT AND CAPABILITY DETERMINATION, 2012, 290 : 129 - +
  • [10] AUTOMATING THE MANAGEMENT INFORMATION-SYSTEMS OF LIBRARIES
    MILNE, DJ
    [J]. CANADIAN JOURNAL OF INFORMATION SCIENCE-REVUE CANADIENNE DES SCIENCES DE L INFORMATION, 1980, 5 (MAY): : 159 - 167