Model of the life cycle of the information security system
When building an information security system, one of the key problems is the creation of regulatory documents. Regulators in the field of information security determine the list of necessary documentation mainly in relation to protection mechanisms (authentication, anti-virus protection, etc.) and p...
Main Authors: | Anton A. Konev, Tatiana E. Mineeva, Mikhail L. Soloviev, Aleksander A. Shelupanov, Mariya P. Silich |
---|---|
Format: | Article |
Language: | English |
Published: |
Joint Stock Company "Experimental Scientific and Production Association SPELS
2018-12-01
|
Series: | Безопасность информационных технологий |
Subjects: | |
Online Access: | https://bit.mephi.ru/index.php/bit/article/view/1159 |
Similar Items
-
Mathematical Model for Choosing Counterparty When Assessing Information Security Risks
by: Andrey Koltays, et al.
Published: (2021-07-01) -
Building a model of infringer
by: Nikolay S Egoshin, et al.
Published: (2017-11-01) -
Selection of family business owners' strategy for avoiding the phase of decline in the business life cycle
by: Arsić Siniša M.
Published: (2018-01-01) -
Integration of life cycle assessment and life cycle costing within a BIM-based environment
by: Salvatore Viscuso, et al.
Published: (2022-10-01) -
Classification coding of coal mechanical equipment information for full life cycle management
by: ZHANG Jianzhong
Published: (2021-01-01)