Information support evaluation of regional personnel security
نویسندگان
چکیده
منابع مشابه
Information Security Policies - The Legal Risk of Uninformed Personnel
Although the development and deployment of an effective information security infrastructure within the company is imperative to the success of the overall information security discipline, it will be a futile exercise if those people who are expected to maintain and monitor information security in the company do not know what is expected and demanded of them. The importance of information securi...
متن کاملSecurity Evaluation supported by Information Security Mechanisms
Information security plays a key role in protection of organization’s assets. There exist a number of standards and guidelines providing huge lists of security controls that, if properly used, might be useful against cyber threats. However, these standards leave the process of controls selection to the organizations. Security manager has to carry out a decision on implementation of security con...
متن کاملInformation Security: Process Evaluation and Product Evaluation
Effective management in any organisation requires a holistic approach in focusing on information security. Senior managers have to know how well their organisations are perfonning as measured against internationally accepted best practices. Part of the information security management problem is that it is viewed either from a technological perspective focussing on product evaluation only, or fr...
متن کاملLaboratory Support for Information Security Education
The Information Security Faculty of MEPhI has felt the necessity of designing educational environment for teaching information and network technologies and their security. MEPhI has already designed and implemented the Network Security Scientific and Research Laboratory. It consists of several logical segments: the Internet emulation segment, teams segments for mutual attacks and defense, contr...
متن کاملIntegrated Repository of Security Information for Network Security Evaluation
Security evaluation systems usually use various information sources to estimate computer network security. One of the important tasks in these systems is integration and storage of information from various sources. The paper is devoted to investigation and development of models and methods to integrate open security databases into one repository. The model of integration proposed in the paper h...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Issues of Risk Analysis
سال: 2019
ISSN: 2658-7882,1812-5220
DOI: 10.32686/1812-5220-2019-16-3-42-51