Management of Security Processes in Information Technologies

被引:0
|
作者
Djokovic, Goran [1 ]
Pavicevic, Aleksandra [2 ]
Vucinic, Dragan [1 ]
Vanka, Gajo M. [3 ]
机构
[1] Modern Bsiness Sch, Belgrade, Serbia
[2] Univ Union Nikola Tesla, Fac Informat Technol & Engn, Belgrade, Serbia
[3] Udruzenje Menadzera Srbije UMS, Belgrade, Serbia
来源
关键词
Confidentiality; Cyber-Attacks; Digital Technologies; ICT Systems; Security Processes; Security Risk;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Confronted with challenges of the Information Technology, the companies have recognized the need to strengthen the resilience of its systems and structure - to strengthen cyber culture and security through continuous innovation and adjustment of the regulatory framework. The improvement of institutional capacities as a whole and continuous monitoring, evaluation and control of organizational and operational responses to cyber challenges is crucial. The goal is to establish a balance between available opportunities and the capacity for proactive performance on the one hand, and dynamic, complex and hard-to-predict cyber threats and risks, on the other.
引用
收藏
页码:53 / 58
页数:6
相关论文
共 50 条
  • [1] Information technologies in management of processes quality
    Kalikhman, S.A.
    Pribory i Sistemy Upravleniya, 2002, (08):
  • [2] Visualization of information security management processes
    Miloslavskaya N.G.
    Tolstoy A.I.
    1600, National Research Nuclear University (09): : 117 - 136
  • [3] Information Security in Intelligent Data Management Processes
    Ogiela, Lidia
    Ogiela, Urszula
    2015 10TH INTERNATIONAL CONFERENCE ON BROADBAND AND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS (BWCCA 2015), 2015, : 169 - 172
  • [4] Information security management system: Processes and products
    Eloff, MM
    Eloff, JHP
    SECURITY AND PRIVACY IN THE AGE OF UNCERTAINTY, 2003, 122 : 193 - 204
  • [5] BUSINESS PROCESSES MANAGEMENT AS SUPPORT TOOL IN THE INFORMATION SECURITY MANAGEMENT
    Della Flora, Fernando
    Tolfo, Cristiano
    REVISTA GEINTEC-GESTAO INOVACAO E TECNOLOGIAS, 2016, 6 (01): : 2756 - 2770
  • [6] A Review on Information, Information Security and Security Processes
    Canbek, Gurol
    Sagiroglu, Seref
    JOURNAL OF POLYTECHNIC-POLITEKNIK DERGISI, 2006, 9 (03): : 165 - 174
  • [7] A taxonomy for information security technologies
    Venter, HS
    Eloff, JHP
    COMPUTERS & SECURITY, 2003, 22 (04) : 299 - 307
  • [8] Applied information security technologies
    Yoshida, Y
    Takeuchi, H
    NTT REVIEW, 2003, 15 (01): : 15 - 20
  • [9] Applied information security technologies
    Yoshida, Yoshihiro
    Takeuchi, Hironori
    2003, Nippon Telegraph and Telephone Corp. (15):
  • [10] Blockchain and deep learning technologies for construction equipment security information management
    Pan, Xing
    Zhong, Botao
    Sheng, Da
    Yuan, Xinqi
    Wang, Yuhang
    AUTOMATION IN CONSTRUCTION, 2022, 136