Visualization of information security management processes

被引:0
|
作者
Miloslavskaya N.G. [1 ]
Tolstoy A.I. [1 ]
机构
[1] National Research Nuclear University, MEPhI (Moscow Engineering Physics Institute)
来源
| 1600年 / National Research Nuclear University卷 / 09期
关键词
Information infrastructure; Information security; Information security maintenance system; Information security management; Management processes; Management system; Visualization of information;
D O I
10.26583/sv.9.5.10
中图分类号
学科分类号
摘要
The article substantiates the need to visualize information about the information security (IS) management processes that help to make informed decisions about their timely adjustment to improve the security of these objects. The structure of the processes of the IS maintenance system (ISMaS) is presented. The main processes of IS management – planning, implementation, control and improvement – are described and their connections with other IS processes are shown. Information on the IS management processes, where its visualization is particularly useful, is determined. The example of the "ISMaS Planning as a single process" process presents visualization of information of all its subprocesses, namely "Object description", "Assets identification", "IS threat analysis", "Selection of IS threats", "IS threat description", "IS risk management", "IS Policy development" and "Internal IS documents development". Two directions of the further research are specified in the conclusion.
引用
收藏
页码:117 / 136
页数:19
相关论文
共 50 条
  • [41] The Implications of Visualization of Information on Marketing Management
    Cermak, Radim
    Reznicek, Vaclav
    PROCEEDINGS OF THE 10TH EUROPEAN CONFERENCE ON MANAGEMENT LEADERSHIP AND GOVERNANCE (ECMLG 2014), 2014, : 410 - 417
  • [42] Information visualization to support management decisions
    Al-Kassab, Jasser
    Ouertani, Zied M.
    Schiuma, Giovanni
    Neely, Andy
    INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY & DECISION MAKING, 2014, 13 (02) : 407 - 428
  • [43] Comparison of Information Security Systems for Asymptotic Information Security Management Critical Information Infrastructures
    Erokhin, Sergey
    Petukhov, Andrey
    Pilyugin, Pavel
    PROCEEDINGS OF THE 28TH CONFERENCE OF OPEN INNOVATIONS ASSOCIATION FRUCT, 2021, : 89 - 95
  • [44] The information security management toolbox - Taking the pain out of security management
    Vermeulen, Clive
    Von Solms, Rossouw
    Information Management and Computer Security, 2002, 10 (2-3): : 119 - 125
  • [45] Modeling of Information Processes for Modern Information System Security Assessment
    Goncharov, Nikita I.
    Goncharov, Igor V.
    Parinov, Pavel A.
    Dushkin, Alexander V.
    Maximova, Maria M.
    PROCEEDINGS OF THE 2019 IEEE CONFERENCE OF RUSSIAN YOUNG RESEARCHERS IN ELECTRICAL AND ELECTRONIC ENGINEERING (EICONRUS), 2019, : 1758 - 1763
  • [46] Security Operations Centers for Information Security Incident Management
    Miloslayskaya, Natalia
    2016 IEEE 4TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD 2016), 2016, : 131 - 138
  • [47] Information security assessment of SMEs as coursework - learning information security management by doing
    Ilvonen, I. (ilona.ilvonen@tut.fi), 1600, Journal of Information Systems Education (24):
  • [48] Information security culture - The socio-cultural dimension in information security management
    Schlienger, T
    Teufel, S
    SECURITY IN THE INFORMATION SOCIETY: VISIONS AND PERSPECTIVES, 2002, 86 : 191 - 201
  • [49] Major accident prevention and management of information systems security in technology-based work processes
    Albrechtsen, Eirik
    JOURNAL OF LOSS PREVENTION IN THE PROCESS INDUSTRIES, 2015, 36 : 84 - 91
  • [50] Information Support of Management Processes
    Broz, Milan
    MANAGEMENT 2010: KNOWLEDGE AND MANAGEMENT IN TIMES OF CRISIS AND ENSUING DEVELOPMENT, PTS I AND II, 2010, : 207 - 217