Back to Search
Start Over
Model of the life cycle of the information security system
- Source :
- Bezopasnostʹ Informacionnyh Tehnologij, Vol 25, Iss 4, Pp 34-42 (2018)
- Publication Year :
- 2018
- Publisher :
- National Research Nuclear University MEPhI (Moscow Engineering Physics Institute), 2018.
-
Abstract
- When building an information security system, one of the key problems is the creation of regulatory documents. Regulators in the field of information security determine the list of necessary documentation mainly in relation to protection mechanisms (authentication, anti-virus protection, etc.) and practically do not take into account the stages of the life cycle of information security tools and personnel of the organization. The article proposes an approach to formalization of the list of information security management processes that need regulation. This approach allows the formation of information security policy to take into account the processes of personnel management and the complex of software and hardware information security, which is necessary to ensure a high level of security of critical information infrastructure.
- Subjects :
- Authentication
lcsh:T58.5-58.64
Relation (database)
lcsh:Information technology
Computer science
business.industry
General Medicine
Information security
lcsh:Q350-390
Documentation
Software
Information security management
Risk analysis (engineering)
Human resource management
lcsh:Information theory
Key (cryptography)
business
information protection system, life cycle, management processes, classification
Subjects
Details
- ISSN :
- 20747136 and 20747128
- Volume :
- 25
- Database :
- OpenAIRE
- Journal :
- Bezopasnost informacionnyh tehnology
- Accession number :
- edsair.doi.dedup.....2f4a1fe6595f688b13ae50818a37aa11
- Full Text :
- https://doi.org/10.26583/bit.2018.4.03