Visualization of information security management processes

被引:0
|
作者
Miloslavskaya N.G. [1 ]
Tolstoy A.I. [1 ]
机构
[1] National Research Nuclear University, MEPhI (Moscow Engineering Physics Institute)
来源
| 1600年 / National Research Nuclear University卷 / 09期
关键词
Information infrastructure; Information security; Information security maintenance system; Information security management; Management processes; Management system; Visualization of information;
D O I
10.26583/sv.9.5.10
中图分类号
学科分类号
摘要
The article substantiates the need to visualize information about the information security (IS) management processes that help to make informed decisions about their timely adjustment to improve the security of these objects. The structure of the processes of the IS maintenance system (ISMaS) is presented. The main processes of IS management – planning, implementation, control and improvement – are described and their connections with other IS processes are shown. Information on the IS management processes, where its visualization is particularly useful, is determined. The example of the "ISMaS Planning as a single process" process presents visualization of information of all its subprocesses, namely "Object description", "Assets identification", "IS threat analysis", "Selection of IS threats", "IS threat description", "IS risk management", "IS Policy development" and "Internal IS documents development". Two directions of the further research are specified in the conclusion.
引用
收藏
页码:117 / 136
页数:19
相关论文
共 50 条
  • [31] Security for System Wide Information Management Collaborative Information Management
    Wilson, Ian
    Yang, Sherry
    2017 INTEGRATED COMMUNICATIONS, NAVIGATION AND SURVEILLANCE CONFERENCE (ICNS), 2017,
  • [32] Information Visualization Metrics and Methods for Cyber Security Evaluation
    Langton, John T.
    Baker, Alex
    2013 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS: BIG DATA, EMERGENT THREATS, AND DECISION-MAKING IN SECURITY INFORMATICS, 2013, : 292 - 294
  • [33] An Approach to Map COBIT Processes to ISO/IEC 27001 Information Security Management Controls
    Sheikhpour, Razieh
    Modiri, Nasser
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2012, 6 (02): : 13 - 28
  • [34] Is information security under control? Investigating quality in information security management
    Baker, Wade H.
    Wallace, Linda
    IEEE SECURITY & PRIVACY, 2007, 5 (01) : 36 - 44
  • [35] Information security management: An information security retrieval and awareness model for industry
    Kritzinger, E.
    Smith, E.
    COMPUTERS & SECURITY, 2008, 27 (5-6) : 224 - 231
  • [36] Using visualization for information management tasks
    Fluit, C
    Wester, J
    SIXTH INTERNATIONAL CONFERENCE ON INFORMATION VISUALISATION, PROCEEDINGS, 2002, : 447 - 454
  • [37] Research on Information Visualization of Sport Management
    Liu Jun
    Wang Xiao-ling
    Zhang Yu
    PROCEEDINGS OF THE 21ST PAN-ASIAN CONGRESS OF SPORTS AND PHYSICAL EDUCATION, VOL 2: EDUCATION AND MANAGEMENT IN SPORTS, 2010, : 157 - 160
  • [38] A visualization model for information resources management
    Zhou Ning
    Wu Jiaxin
    Wang Bing
    Zhang Shaolong
    PROCEEDINGS OF THE 12TH INTERNATIONAL INFORMATION VISUALISATION, 2008, : 57 - +
  • [39] Information Visualization to Support Idea Management
    Candido, R.
    Lemos, R.
    Goncalves, A.
    IEEE LATIN AMERICA TRANSACTIONS, 2022, 20 (06) : 866 - 874
  • [40] Academic Management through the visualization of information
    Guerra, Laura
    Arciniegas, Stalin
    2019 14TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI), 2019,