Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Pavel Pilyugin"'
Publikováno v:
Proceedings of the XXth Conference of Open Innovations Association FRUCT, Vol 28, Iss 1, Pp 89-95 (2021)
The article reviews the options for critical information infrastructures (CII) protection management and discusses approaches to developing security policies that dont lean on assessing residual risks and identifying a fixed list of threats. We exami
Externí odkaz:
https://doaj.org/article/1c722130adca4e6b84e8a314406fa2af
Publikováno v:
Proceedings of the XXth Conference of Open Innovations Association FRUCT, Vol 854, Iss 24, Pp 594-598 (2019)
The paper deals with the problem of control of critical information infrastructures (CII) in order to ensure information security and functional reliability. It is proved that safety in such systems primarily affects the availability - that is, ensur
Externí odkaz:
https://doaj.org/article/92af412755284ee684c00b97a31c185a
Publikováno v:
Proceedings of the XXth Conference of Open Innovations Association FRUCT, Vol 854, Iss 24, Pp 82-88 (2019)
The paper discusses the modeling of various aspects of the security of critical information infrastructures (CII) in the assumption of creating a reference model of CII security in the future. The features of CII in terms of goals and safety criteria
Externí odkaz:
https://doaj.org/article/ce7a1107d9d84aaf878c49ed8896ad69
Publikováno v:
FRUCT
Proceedings of the XXth Conference of Open Innovations Association FRUCT, Vol 28, Iss 1, Pp 89-95 (2021)
Proceedings of the XXth Conference of Open Innovations Association FRUCT, Vol 28, Iss 1, Pp 89-95 (2021)
The article reviews the options for critical information infrastructures (CII) protection management and discusses approaches to developing security policies that don't lean on assessing residual risks and identifying a fixed list of threats. We exam
Publikováno v:
FRUCT
Proceedings of the XXth Conference of Open Innovations Association FRUCT, Vol 854, Iss 24, Pp 82-88 (2019)
Proceedings of the XXth Conference of Open Innovations Association FRUCT, Vol 854, Iss 24, Pp 82-88 (2019)
The paper discusses the modeling of various aspects of the security of critical information infrastructures (CII) in the assumption of creating a reference model of CII security in the future. The features of CII in terms of goals and safety criteria
Publikováno v:
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON TECHNOLOGY & ENTREPRENEURSHIP IN DIGITAL SOCIETY.
Publikováno v:
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON TECHNOLOGY & ENTREPRENEURSHIP IN DIGITAL SOCIETY.