Visualization of information security management processes

被引:0
|
作者
Miloslavskaya N.G. [1 ]
Tolstoy A.I. [1 ]
机构
[1] National Research Nuclear University, MEPhI (Moscow Engineering Physics Institute)
来源
| 1600年 / National Research Nuclear University卷 / 09期
关键词
Information infrastructure; Information security; Information security maintenance system; Information security management; Management processes; Management system; Visualization of information;
D O I
10.26583/sv.9.5.10
中图分类号
学科分类号
摘要
The article substantiates the need to visualize information about the information security (IS) management processes that help to make informed decisions about their timely adjustment to improve the security of these objects. The structure of the processes of the IS maintenance system (ISMaS) is presented. The main processes of IS management – planning, implementation, control and improvement – are described and their connections with other IS processes are shown. Information on the IS management processes, where its visualization is particularly useful, is determined. The example of the "ISMaS Planning as a single process" process presents visualization of information of all its subprocesses, namely "Object description", "Assets identification", "IS threat analysis", "Selection of IS threats", "IS threat description", "IS risk management", "IS Policy development" and "Internal IS documents development". Two directions of the further research are specified in the conclusion.
引用
收藏
页码:117 / 136
页数:19
相关论文
共 50 条
  • [21] The Information Security Risk Management
    Semin, Valeriy G.
    Shmakova, Elena G.
    Los, Lexei B.
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE QUALITY MANAGEMENT,TRANSPORT AND INFORMATION SECURITY, INFORMATION TECHNOLOGIES (IT&QM&IS), 2017, : 106 - 109
  • [22] Information security and risk management
    Bodin, Lawrence D.
    Gordon, Lawrence A.
    Loeb, Martin P.
    COMMUNICATIONS OF THE ACM, 2008, 51 (04) : 64 - 68
  • [23] STANDARDIZATION IN INFORMATION SECURITY MANAGEMENT
    Fal', A. M.
    CYBERNETICS AND SYSTEMS ANALYSIS, 2010, 46 (03) : 512 - 515
  • [24] IT/IS SECURITY MANAGEMENT WITH UNCERTAIN INFORMATION
    Klimes, Cyril
    Bartos, Jiri
    KYBERNETIKA, 2015, 51 (03) : 408 - 419
  • [25] The Construction of Information Security Management
    Quan, Yin
    SOCIAL SCIENCE AND EDUCATION, 2013, 10 : 519 - 521
  • [26] A framework for the management of information security
    Leiwo, J
    Zheng, YL
    INFORMATION SECURITY, 1998, 1396 : 232 - 245
  • [27] Knowledge management and information security
    Buogo, Mateus
    Fachinelli, Ana Cristina
    Giacomello, Cintia Paese
    ATOZ-NOVAS PRATICAS EM INFORMACAO E CONHECIMENTO, 2019, 8 (02): : 49 - 59
  • [28] Security in Management of Distributed Information
    Ogiela, Marek R.
    Ogiela, Lidia
    Ogiela, Urszula
    UBIQUITOUS COMPUTING APPLICATION AND WIRELESS SENSOR, 2015, 331 : 457 - 462
  • [29] A survey on security visualization techniques for web information systems
    Dang, Tran Khanh
    Dang, Tran Tri
    INTERNATIONAL JOURNAL OF WEB INFORMATION SYSTEMS, 2013, 9 (01) : 6 - +
  • [30] Method of Constructing a Visualization of Threat Model of Information Security
    Manzhosov, A., V
    Bolodurina, I. P.
    2020 IEEE 14TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES (AICT2020), 2020,