Integrated Information Protection Operations

Author(s):  
S. Hanson
2020 ◽  
Vol 2020 (2) ◽  
pp. 43-49
Author(s):  
D. Fedorov ◽  
A. Verzilova ◽  
V. Khoroshenko ◽  
M. Buinevich

The article discusses issues related to the necessary stage components of designing business games for teaching students to build an integrated information security system at an enterprise: features of the analysis of the initial data of an economic entity, the need to conduct a risk assessment in the context of the dynamics of the external world, ensuring the variability of building a protection strategy, forming an objective assessment the effectiveness of the protection system built by the participants.


2015 ◽  
Vol 760 ◽  
pp. 689-694
Author(s):  
Nicolae Anton ◽  
Anișor Nedelcu

This paper presents an approach to the risk of information security. By taking into consideration how critical it is for a system, each category of information should be associated with a correspondent level of security risk and each level of security risk must be defined by appropriate measures to control the risks for information security. Equally important is how many levels of security risk are defined for information, or how they are classified. It is critical, however, that the model adopted reflects all the objectives that the system requires.


2021 ◽  
Vol 4 ◽  
pp. 66-73
Author(s):  
M.V. Buinevich ◽  
◽  
V. V. Pokussov ◽  
K.E. Izrailov ◽  
◽  
...  

The article describes a model of threats arising from information and technical interaction between subsystem modules after their integration into a unified information protection system. The terminological base used in this subject area is defined. An ontological model is given that determines the relationship between the basic concepts. A description of the six main threats of interaction that make up the model is given, indicating the following characteristics: the source of the threat’s vulnerability, the method of its implementation, the object of the attack, the consequences of implementation in terms of violation of internal information security and damage to the performance of the integrated information protection system. The differences of this model from the typical ones used in organizations are given.


2020 ◽  
Vol 10 (2) ◽  
pp. 27-35
Author(s):  
Suhyeon Kim ◽  
Sumin Kang ◽  
Jaein Yoo ◽  
Gahyeon Lee ◽  
Hyojeong Yi ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document