2021 28th Conference of Open Innovations Association (FRUCT) 2021
DOI: 10.23919/fruct50888.2021.9347608
|View full text |Cite
|
Sign up to set email alerts
|

Comparison of Information Security Systems for Asymptotic Information Security Management Critical Information Infrastructures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(7 citation statements)
references
References 5 publications
0
6
0
1
Order By: Relevance
“…Из сочетания условий ненулевой субъективной вероятности и недопустимости остаточного риска следует принципиальная недостижимость целевого состояния объекта управления в рамках традиционного рискориентированного подхода к управлению безопасностью [36].…”
Section: обработка остаточного рискаunclassified
“…Из сочетания условий ненулевой субъективной вероятности и недопустимости остаточного риска следует принципиальная недостижимость целевого состояния объекта управления в рамках традиционного рискориентированного подхода к управлению безопасностью [36].…”
Section: обработка остаточного рискаunclassified
“…-SolarWinds, Microsoft Exchange, Kaseya, Log4j [1]; -WannaCry [2], Petya [3], Equifax credit bureau hack [4]; -Facebook data leak [5,6]. As a result, millions of users and hundreds of critical businesses were affected [1,2,7,8].…”
Section: Overview Of Existing Network Security Classes In Critical Ob...mentioning
confidence: 99%
“…Therefore, the intensive development special-purpose communication systems of various types based on innovative next generation network (NGN) and future networks (FN) technologies require the creation of a highly efficient link telecommunication networks that ensure information security and reliability systems for managing important objects critical infrastructures. The control and management systems responsible objects critical information infrastructures are subject to requirements for parametric reliability and information security [1,2].…”
Section: Introductionmentioning
confidence: 99%
“…The implementation of security applications protects against threats, but they also tend to access a range of information that invades privacy [41]. Organizations that invest in security systems also consider critical infrastructure security, as this refers to the protection of systems, networks, and assets whose operation ensures statewide security and, if computing resources are limited, it is impossible to run anti-malware programs [42].…”
Section: Security Investmentsmentioning
confidence: 99%