scholarly journals Information security assessment in public administration

2020 ◽  
Vol 90 ◽  
pp. 101709 ◽  
Author(s):  
Edyta Karolina Szczepaniuk ◽  
Hubert Szczepaniuk ◽  
Tomasz Rokicki ◽  
Bogdan Klepacki
Author(s):  
T.M. Yarkova ◽  

This article presents an analysis of the changes that have occurred in one of the most important state documents - the Food Security Doctrine of the Russian Federation. Criticism of this document can be traced in many scientific works: some experts attribute the Doctrine only to a program document, while others expect it to be implement and control, i.e. much more in practice. An assessment of the significance and essence of such a document as the doctrine as a whole made it possible to determine its place both in the system of public administration and the degree of its significance in the regulatory field. Based on the findings, an attempt was made to analyze changes in the new Doctrine of Food Security of the Russian Federation, approved by Decree of the President of Russia No. 20 of 01.21.2020. Structural changes in the new Doctrine are highlighted, as well as a critical assessment of the features of all its main sections. The greatest changes were revealed in the state food security assessment system, and it was also determined that the new version of the Doctrine has a greater social bias. If there are positive changes, some omissions of the most important areas of agri-food policy have been identified, which, despite their absence or insufficient reflection in the Doctrine, can be presented and decided at the level of subsequent documents, but only if the Doctrine in practice will be a fundamental document of public administration and regulatory framework.


Author(s):  
Masuyoshi YACHIDA ◽  
Mototsugu Muroi ◽  
Taku Kitahara ◽  
Ryohta YAMASHINA

Author(s):  
Andrei V. Gavrilenko ◽  

The article considers an issue of information security of the distance education systems. It analyzes the functions and architecture of the typical distance education system. With considering the requirements of information security it also discusses the university information system for solving the distance learning problems. The author defines valuable assets and information resources and describes the existing security threats. The subjects of interaction in the distance learning mode are presented. There is a consideration of the principal directions of the university’s activity in the distance learning system, requiring constant monitoring of information security. A threat model is worked out and the main security vulnerabilities are highlighted. The analysis of the causes and consequences of information security violation in the distance learning system is carried out and most vulnerable and critical nodes were identified. The hardware and software requirements for the remote mode work are regarded. A recommended list of hardware and software tools that ensure compliance with safety requirements is presented. The major lines of protection for distance learning systems are highlighted. The article proves the necessity of conducting a regular security assessment as a means for monitoring an effectiveness of the protection system.


2020 ◽  
Vol 15 (16) ◽  
pp. 128-132
Author(s):  
V. V. Shapovalov ◽  
◽  
A. A. Gudzenko ◽  
V. A. Shapovalova ◽  
V. V. Shapovalov ◽  
...  

Introduction. Modern turbulent state of society actualizes need for scientifically based methods and technological solutions to improve the information security system not only for the state, but also for society and the person in particular. Objective. To highlight the significant factors of information security of social development and to study the role of public admini-stration in the context of the actualization of information threats and risks. Study results. The article considers the essence of state management approaches to information security based on interpretation in terms of risk management. Information security is presented as a dynamic system that needs balance. Balance can be disturbed by external and internal factors. The 8 most significant factors that need to be taken into account to develop effective models of public administration in the field of information security are identified. 4 paradigms of information security management (systemic, synergetic, phenomenological and cognitive) which can be involved are considered. However, they are not universal and separate in any particular case, that is they are systemic in nature, and security management should be based on their integrated application depending on the situation and the specifics of the management process. Based on the analysis of the classical model of maintaining the state balance of a dynamic system, it is concluded that it can be used to ensure information security. A model is proposed to explain the reasons for the imbalance of the dynamic system of information security under the action of factors of influence and the risks that accompany them, and to determine the measures of public administration to ensure it. Conclusion. The model is proposed to explain the reasons for the imbalance of the dynamic system of information security under the action of factors of influence and the risks that accompany them, and to determine the measures of public administration to ensure it. Key words: Information security; Information security factors; Society; Public administration; Information security model.


2020 ◽  
Vol 15 (16) ◽  
pp. 121-128
Author(s):  
O. A. Panchenko ◽  

Introduction. Modern turbulent state of society actualizes need for scientifically based methods and technological solutions to improve the information security system not only for the state, but also for society and the person in particular. Objective. To highlight the significant factors of information security of social development and to study the role of public admini-stration in the context of the actualization of information threats and risks. Study results. The article considers the essence of state management approaches to information security based on interpretation in terms of risk management. Information security is presented as a dynamic system that needs balance. Balance can be disturbed by external and internal factors. The 8 most significant factors that need to be taken into account to develop effective models of public administration in the field of information security are identified. 4 paradigms of information security management (systemic, synergetic, phenomenological and cognitive) which can be involved are considered. However, they are not universal and separate in any particular case, that is they are systemic in nature, and security management should be based on their integrated application depending on the situation and the specifics of the management process. Based on the analysis of the classical model of maintaining the state balance of a dynamic system, it is concluded that it can be used to ensure information security. A model is proposed to explain the reasons for the imbalance of the dynamic system of information security under the action of factors of influence and the risks that accompany them, and to determine the measures of public administration to ensure it. Conclusion. The model is proposed to explain the reasons for the imbalance of the dynamic system of information security under the action of factors of influence and the risks that accompany them, and to determine the measures of public administration to ensure it. Key words: Information security; Information security factors; Society; Public administration; Information security model.


2019 ◽  
Vol 2 (2) ◽  
pp. 57-64
Author(s):  
Arini Arini

Information is one of the important assets for the survival of an organization / business, defense security and the integrity of the country, public trust between consumers, so that the availability, accuracy and integrity must be maintained, or commonly abbreviated as CIA (Confidentiality, Integrity & Availability). ISO 27001 is an information security standard published in October 2005 by the International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC). However, until now there has been no tool for companies in Indonesia to do a pre-assessment of the level of information security. Plus the lack of socialization of the rules and the lack of ISO 270001 expert in Indonesia, these are reason why the authors conducted this research. The author begins research by collecting data, by studying literature and interviewing experts to identify problems. After that, in its implementation, this research will be directed (knowledge acquisition) and reviewed directly by an ISO 27001 expert from The British Standard Institution of the United Kingdom (BSI) so that the results are more accurate. After that, the writer determines the weighting method (decision making), scoring method, system development method, and simulation method (testing). The results of the study are in the form of pre-assessment to evaluate the information security assessment index, which will be displayed according to indicators pioneered from ISO 27001: 2013 using AHP (Analytical Hierarchy Process) decision-making methods, as well as web-based making it easier to review.


2022 ◽  
Vol 1 (13) ◽  
pp. 80-92
Author(s):  
Nguyễn Mạnh Thiên ◽  
Phạm Đăng Khoa ◽  
Nguyễn Đức Vượng ◽  
Nguyễn Việt Hùng

Tóm tắt—Hiện nay, nhiệm vụ đánh giá an toàn thông tin cho các hệ thống thông tin có ý nghĩa quan trọng trong đảm bảo an toàn thông tin. Đánh giá/khai thác lỗ hổng bảo mật cần được thực hiện thường xuyên và ở nhiều cấp độ khác nhau đối với các hệ thống thông tin. Tuy nhiên, nhiệm vụ này đang gặp nhiều khó khăn trong triển khai diện rộng do thiếu hụt đội ngũ chuyên gia kiểm thử chất lượng ở các cấp độ khác nhau. Trong khuôn khổ bài báo này, chúng tôi trình bày nghiên cứu phát triển Framework có khả năng tự động trinh sát thông tin và tự động lựa chọn các mã để tiến hành khai thác mục tiêu dựa trên công nghệ học tăng cường (Reinforcement Learning). Bên cạnh đó Framework còn có khả năng cập nhật nhanh các phương pháp khai thác lỗ hổng bảo mật mới, hỗ trợ tốt cho các cán bộ phụ trách hệ thống thông tin nhưng không phải là chuyên gia bảo mật có thể tự động đánh giá hệ thống của mình, nhằm giảm thiểu nguy cơ từ các cuộc tấn công mạng. Abstract—Currently, security assessment is one of the most important proplem in information security. Vulnerability assessment/exploitation should be performed regularly with different levels of complexity for each information system. However, this task is facing many difficulties in large-scale deployment due to the lack of experienced testing experts. In this paper, we proposed a Framework that can automatically gather information and automatically select suitable module to exploit the target based on reinforcement learning technology. Furthermore, our framework has intergrated many scanning tools, exploited tools that help pentesters doing their work. It also can be easily updated new vulnerabilities exploit techniques.


Sign in / Sign up

Export Citation Format

Share Document