Problems of ensuring information security of ukraine critical information infrastructure systems

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Modelling For Ensuring Information Security Of The Distributed Information Systems

In the paper the concept of the permitted interactions is defined, i.e. such interactions are necessary for the tasks which are legally started at present. Any other interactions are considered as forbidden. The main objective is definition, what interactions are permitted during this period of time. For the solution of this problem it is offered to model the needs for interactions depending on...

متن کامل

Security Requirements Driven Risk Assessment for Critical Infrastructure Information Systems

Major information processing and associated value-added services provided by information systems in critical infrastructures are being increasingly used for various purposes irrespective of their security posture. Although several infrastructure-wide standard security Certification and Accreditation (C&A) processes exist, their effectiveness in the real world is challenged by the complexity of ...

متن کامل

Information Security Standards in Critical Infrastructure Protection

The standards applicable to Information Security are legion, from the purely technical, low-level specification of crypto protocols to the high-level organisational management frameworks. Industrial Control Systems among them the Information Systems in Critical Infrastructure still present their own set of challenges and quirks, despite the convergence trend towards mainstream information techn...

متن کامل

Information Security Governance: Investigating Diversity in Critical Infrastructure Organizations

The aim of this paper is to report on how information security governance (ISG) arrangements are framed and shaped in practice. Our objective is to examine the extent to which the similarities and differences in institutional environments can subject organizations to multiple, competing and even contradictory arrangements for ISG. Using an interpretive case based research strategy we investigat...

متن کامل

A CBK for Information Security and Critical Infrastructure Protection

Academic institutions educate future Information Security and Crit ical Infrastructure Protection (ISCIP) professionals, offering expedient and broad knowledge of the field. As industry often demands higher productivity and stronger specialization, several organizations (academic, governmental, industrial) considered the use of a Common Body of Knowledge (CBK), to serve as a tool that appropria...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Collection "Information technology and security"

سال: 2013

ISSN: 2518-1033,2411-1031

DOI: 10.20535/2411-1031.2013.2.1.58384