Implementing secure dependencies over a network by designing a distributed security subsystem

Author(s):  
Bruno d'Ausbourg
Keyword(s):  
Author(s):  
Myriam Dunn Cavelty

Due to heightened threat perceptions, states are currently expanding their coercive power in cyberspace. They attempt to reduce the risk of escalation in (cybered-)conflict through traditional norms building. At the same time, their strategic actions remain the biggest threat to stability. Cyber-exploitations are a major part of the problem, hindering the removal of known insecurities, thus reducing the effectiveness of any future order. At the same time, the forceful role that states aspire to play in cyber-security has led to questions of legitimacy. The security arrangements that emerged in the 1990s, focused on protection and risk management, had a high degree of legitimacy because they built on a pragmatic solution of distributed security provision. Unless a future order in cyberspace takes into account the interests of companies and consumers who shape this domain in peacetime, it will be met with considerable resistance, with high costs for all sides.


Author(s):  
А.И. Сухотерин

В статье рассматривается проблемы управления ИБ на территориально-распределённых объектах защиты. Во избежание простоев и для сохранения безопасности на предприятии необходимо внедрение технологий, позволяющих обнаруживать и прогнозировать риски. Предлагается с помощью промышленного интернета-вещей обеспечить непрерывный интеллектуальный мониторинг ключевых показателей, что дает возможность определить проблему и принять необходимые меры для ее решения. Оперативный в режиме реального времени анализ поможет специалисту ИБ быстрее находить уязвимые места и предотвратить несанкционированные действия на предприятии. This article discusses the problems of is management on geographically distributed security objects. In order to avoid downtime and to maintain security at the enterprise, it is necessary to introduce technologies that allow detecting and predicting risks. It is proposed to use the industrial Internet of things to provide continuous intellectual monitoring of key indicators, which makes it possible to identify the problem and take the necessary measures to solve it. Real-time real-time analysis will help the IB specialist find vulnerabilities faster and prevent unauthorized actions in the enterprise .


Sign in / Sign up

Export Citation Format

Share Document