Zobrazeno 1 - 10
of 25
pro vyhledávání: '"Vasyl Tsurkan"'
Autor:
Vasyl Tsurkan
Publikováno v:
Кібербезпека: освіта, наука, техніка, Vol 1, Iss 9, Pp 149-158 (2020)
Розглянуто процес аналізування вимог до систем управління інформаційною безпекою. Показано обов’язковість дотримання їхнього перелі
Externí odkaz:
https://doaj.org/article/dc1d19196b41482b8d16c9e559405817
Autor:
Vasyl Tsurkan
Publikováno v:
Кібербезпека: освіта, наука, техніка, Vol 4, Iss 8, Pp 192-201 (2020)
Розглянуто процес функціонального аналізування стосовно систем управління інформаційною безпекою. Показано актуальність їх представ
Externí odkaz:
https://doaj.org/article/7a773f89dd2249e2a0521a27ffbab900
Autor:
Vasyl Tsurkan
Publikováno v:
Collection "Information Technology and Security". 10:204-215
Autor:
Vasyl Tsurkan, Dmitry Voloshin
Publikováno v:
Collection "Information Technology and Security". 9:200-208
Autor:
Vasyl Tsurkan, Volodymyr Mokhor
Publikováno v:
Collection "Information Technology and Security". 9:80-90
Publikováno v:
Collection "Information Technology and Security". 8:92-101
Autor:
Vasyl Tsurkan
Publikováno v:
Cybersecurity: Education, Science, Technique. 4:192-201
The process of functional analysis of information security management systems was considered. The relevance of their presentation with many interrelated functions with internal and external interfaces is shown. Taking this into account, the methods o
Autor:
Vasyl Tsurkan
Publikováno v:
Cybersecurity: Education, Science, Technique. 1:149-158
The process of analyzing the requirements for information security management systems is considered. The obligation to comply with the requirements of the international standard ISO/IEC 27001 is shown. This provides confidence to stakeholders in the
Publikováno v:
2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS).
Autor:
Vasyl Tsurkan, Volodymyr Mokhor
Publikováno v:
Collection "Information technology and security". 7:197-207
The problems of information security management system development in the organization are considered. Conceptual bases of its architecture description are presented. Basic concepts regarding the information security management system architecture ar