ANALYTICAL REVIEW OF APPROACHES TO DEVELOPING INFORMATION SECURITY POLICIES FOR AUTOMATED INFORMATION SYSTEMS

Authors

  • S. V. Koryakin Институт информационных технологий КГТУ им. И.Раззакова
  • А.Т. Рысалиева Институт информационных технологий КГТУ им. И.Раззакова
  • И.В. Якимчук Институт информационных технологий КГТУ им. И.Раззакова
  • Т.Н. Марченко Институт информационных технологий КГТУ им. И.Раззакова

Keywords:

информационная безопасность (ИБ), политика ИБ, технологии защиты информации, риски, аудит ИБ, ISO/IEC 27001, DLP, IDS, SIEM, антивирусы, автоматизированные информационные системы (АИС).

Abstract

At present, when threats to information security have reached unprecedented proportions, issues of information security and sustainable development of automated information systems (AIS) are acquiring a special side. The steadily increasing pressure on AIS by intruders and cybercriminals, simultaneously aggravated by the activities of employees servicing and operating these systems, activates the need for an integrated approach to ensuring information protection in AIS and a thorough analysis of the security status of all components and subsystems included in the AIS. In this light, monitoring the security status of AIS is a central aspect for assessing and forecasting changes caused by the impact of external and internal threats to information security. This not only allows you to track the security status of AIS from information security threats, but also to identify trends in changes in the level of their modification and development, assess possible risks and the level of damage not caused by information security incidents. The complexity and significance of this problem require the use of the latest technologies and approaches. One of the key steps necessary to solve the problem is the high-quality development of an information security policy in the AIS. This paper examines in detail the stages of development and various approaches and methods for developing an information security policy, including normative, risk, proactive, and reactive approaches. A comparative analysis of these approaches is conducted in terms of their advantages and disadvantages. Recommendations are presented for using a combined approach to create an effective information security system that ensures comprehensive security of information transmitted, stored, and processed in the AIS.

References

ISO/IEC 27001-2005. Information technology - Security techniques - Information security management systems - Requirements.

IT-Enigma.ru

LanAgent.ru

https://falcongaze.com/ru/pressroom/publications/articles/%D0%BF%D0%BE%D0%BB%D0%B8%D1%82%D0%B8%D0%BA%D0%B0-%D0%B8%D0%BD%D1%84%D0%BE%D1%80%D0%BC%D0%B0%D1%86%D0%B8%D0%BE%D0%BD%D0%BD%D0%BE%D0%B9-%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D0%B8.html

https://habr.com/ru/articles/174489/

ISO/IEC 17799-2005. Information technology - Security techniques - Code of practice for information security management.

ГОСТ Р ИСО/МЭК 15408. Информационная технология. Методы и средства обеспечения безопасности. Критерии оценки безопасности информационных технологий.

Azone-IT.ru

https://lanagent.ru/

https://www.komset.ru/informatsiya-o-kompanii/articles/zaschita-informatsii-v-lokalnykh-setyakh

https://chatgpt.com/

https://app.diagrams.net/

https://ovfd.zdrav76.ru/?page_id=848

https://www.expocentr.ru/ru/articles-of-exhibitions/17039/

Downloads

Published

2024-08-17

Issue

Section

INFORMATION TECHNOLOGY AND INFORMATION PROCESSING

Categories