Modern techniques are used to evaluate threate and vulnerabilities information systems
Автор: Gubareva O.Yu., Pugin V.V.
Журнал: Инфокоммуникационные технологии @ikt-psuti
Рубрика: Электромагнитная совместимость и безопасность оборудования
Статья в выпуске: 1 т.11, 2013 года.
Бесплатный доступ
Modern information systems trust the solution of the most diverse and important tasks: automatic control of technological processes and industrial enterprises, the automation of activities of banks, financial markets, insurance and trading companies, and so on. Grow the size and complexity of corporate systems. The importance of the task of ensuring the security of corporate information resources is understood as the management of companies, and customers. And already insufficient condition is the organization of the protection of individual segments of the information system. Proceeding from this, the requirements of information security should be aimed at ensuring an optimal regime of functioning of the information system as a whole.
Information security, information system, risk, analysis, technique, security, model, audit, threat, vulnerability, counter-measure
Короткий адрес: https://sciup.org/140191598
IDR: 140191598