Back to Search Start Over

Model of the life cycle of the information security system

Authors :
Tatiana E. Mineeva
Aleksander A. Shelupanov
Mikhail L. Soloviev
Anton Konev
Mariya P. Silich
Source :
Bezopasnostʹ Informacionnyh Tehnologij, Vol 25, Iss 4, Pp 34-42 (2018)
Publication Year :
2018
Publisher :
National Research Nuclear University MEPhI (Moscow Engineering Physics Institute), 2018.

Abstract

When building an information security system, one of the key problems is the creation of regulatory documents. Regulators in the field of information security determine the list of necessary documentation mainly in relation to protection mechanisms (authentication, anti-virus protection, etc.) and practically do not take into account the stages of the life cycle of information security tools and personnel of the organization. The article proposes an approach to formalization of the list of information security management processes that need regulation. This approach allows the formation of information security policy to take into account the processes of personnel management and the complex of software and hardware information security, which is necessary to ensure a high level of security of critical information infrastructure.

Details

ISSN :
20747136 and 20747128
Volume :
25
Database :
OpenAIRE
Journal :
Bezopasnost informacionnyh tehnology
Accession number :
edsair.doi.dedup.....2f4a1fe6595f688b13ae50818a37aa11
Full Text :
https://doi.org/10.26583/bit.2018.4.03