CURRENT STATE OF INFORMATION SECURITY MANAGEMENT PHILOSOPHY

被引:0
|
作者
Baranov, Alexander [1 ]
机构
[1] Fed State Unitary Enterprise Main Res Comp Ctr GN, Fed Tax Serv Russia, Property 3,Bdg 1,Pohodnyi Proezd, Moscow 125373, Russia
来源
关键词
philosophy; reflection; information; security of interaction; information security; management efficiency; W.R. Ashby law; regulators; self-regulated organizations;
D O I
暂无
中图分类号
F [经济];
学科分类号
02 ;
摘要
The paper elaborates a philosophical vision of the <<information security management efficiency>> concept. The concept is based on presentation of information as content of interacting systems' reflection. This approach allows considering from a unified point of view the issues of information protection for technical, computer, social and political systems. The key point of the concept is formulation of systems' interaction goals that may by profoundly different for different parts of the interaction. The concept of information security management is proposed to be interpreted as management of the state of sufficiency of ensuring of information transfer that occurs during interaction of the systems. This definition is a special case of the traditional concept of system management, if the system is considered as a set of interacting objects performing the reflection process. The approach expands the traditional view on information security management presented in the standards of various Russian and international organizations. The common approach appears to be a special case based on risk assessment or statutory regulations. In turn, the W.R. Ashby's law appears to be applicable for evaluation of the information security management process, as a particular case of the system management process. The approach allows discovering new possibilities to improve managing system efficiency for operative level of management. An example of the Portal for Government Services as government agency's systems interaction with citizens is discussed. The conclusion about weak information protection of the people's system in the process of mutual reflection of a government agency and society has been drawn. As a possible way to increase management effectiveness it is recommended to employ the potential of the self-regulatory organizations.
引用
收藏
页码:7 / 14
页数:8
相关论文
共 50 条
  • [21] A framework for the management of information security
    Leiwo, J
    Zheng, YL
    [J]. INFORMATION SECURITY, 1998, 1396 : 232 - 245
  • [22] Security for System Wide Information Management Collaborative Information Management
    Wilson, Ian
    Yang, Sherry
    [J]. 2017 INTEGRATED COMMUNICATIONS, NAVIGATION AND SURVEILLANCE CONFERENCE (ICNS), 2017,
  • [23] Is information security under control? Investigating quality in information security management
    Baker, Wade H.
    Wallace, Linda
    [J]. IEEE SECURITY & PRIVACY, 2007, 5 (01) : 36 - 44
  • [24] Information security management: An information security retrieval and awareness model for industry
    Kritzinger, E.
    Smith, E.
    [J]. COMPUTERS & SECURITY, 2008, 27 (5-6) : 224 - 231
  • [25] Comparison of Information Security Systems for Asymptotic Information Security Management Critical Information Infrastructures
    Erokhin, Sergey
    Petukhov, Andrey
    Pilyugin, Pavel
    [J]. PROCEEDINGS OF THE 28TH CONFERENCE OF OPEN INNOVATIONS ASSOCIATION FRUCT, 2021, : 89 - 95
  • [26] The information security management toolbox - Taking the pain out of security management
    Vermeulen, Clive
    Von Solms, Rossouw
    [J]. Information Management and Computer Security, 2002, 10 (2-3): : 119 - 125
  • [27] State of the art security management
    Forte, Dario
    [J]. Computer Fraud and Security, 2009, 2009 (10): : 17 - 18
  • [28] Security Operations Centers for Information Security Incident Management
    Miloslayskaya, Natalia
    [J]. 2016 IEEE 4TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD 2016), 2016, : 131 - 138
  • [29] Information Sovereignty as the Basis of Modern State Information Security
    Zozulia, Oleksandr
    Zozuha, Ihor
    Brusakova, Oksana
    Kholod, Yurii
    Berezhna, Yevheniia
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2021, 21 (12): : 264 - 268
  • [30] Countering fake information as a guarantee of state information security
    Andrii V. Svintsytskyi
    Oleksandr H. Semeniuk
    Olena S. Ufimtseva
    Yurii B. Irkha
    Serhii V. Suslin
    [J]. Security Journal, 2023, 36 : 427 - 442