About the Comparison of Information Security Systems for Asymptotic Information Security Management of Critical Information Infrastructures
2020 ◽
Vol 6
(3)
◽
pp. 66-74
Keyword(s):
The article discusses the security management capabilities of critical information infrastructures. It discusses approaches to developing security policies that don’t lean on assessing residual risks and identifying a fixed list of threats. We examine the possibility of building information security management systems based on monitoring of security events. A formal description of security events as well as relevant protection methods is proposed. The paper introduces an order relation for information security systems comparison and asymptotic CII security control implementation.
2008 ◽
pp. 350-357
◽
2016 ◽
Vol 6
(4)
◽
pp. 86-88
2021 ◽
Vol 12
(4)
◽
pp. 36-50
2016 ◽
Vol 14
(3)
◽
pp. 254-271
◽
2011 ◽
pp. 390-395