Problems of ensuring information security of ukraine critical information infrastructure systems
نویسندگان
چکیده
منابع مشابه
Modelling For Ensuring Information Security Of The Distributed Information Systems
In the paper the concept of the permitted interactions is defined, i.e. such interactions are necessary for the tasks which are legally started at present. Any other interactions are considered as forbidden. The main objective is definition, what interactions are permitted during this period of time. For the solution of this problem it is offered to model the needs for interactions depending on...
متن کاملSecurity Requirements Driven Risk Assessment for Critical Infrastructure Information Systems
Major information processing and associated value-added services provided by information systems in critical infrastructures are being increasingly used for various purposes irrespective of their security posture. Although several infrastructure-wide standard security Certification and Accreditation (C&A) processes exist, their effectiveness in the real world is challenged by the complexity of ...
متن کاملInformation Security Standards in Critical Infrastructure Protection
The standards applicable to Information Security are legion, from the purely technical, low-level specification of crypto protocols to the high-level organisational management frameworks. Industrial Control Systems among them the Information Systems in Critical Infrastructure still present their own set of challenges and quirks, despite the convergence trend towards mainstream information techn...
متن کاملInformation Security Governance: Investigating Diversity in Critical Infrastructure Organizations
The aim of this paper is to report on how information security governance (ISG) arrangements are framed and shaped in practice. Our objective is to examine the extent to which the similarities and differences in institutional environments can subject organizations to multiple, competing and even contradictory arrangements for ISG. Using an interpretive case based research strategy we investigat...
متن کاملA CBK for Information Security and Critical Infrastructure Protection
Academic institutions educate future Information Security and Crit ical Infrastructure Protection (ISCIP) professionals, offering expedient and broad knowledge of the field. As industry often demands higher productivity and stronger specialization, several organizations (academic, governmental, industrial) considered the use of a Common Body of Knowledge (CBK), to serve as a tool that appropria...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Collection "Information technology and security"
سال: 2013
ISSN: 2518-1033,2411-1031
DOI: 10.20535/2411-1031.2013.2.1.58384