 |
advertisement |
|
|
|
|
|
|
Instruments and Systems: Monitoring, Control, and Diagnostics Annotation << Back
The Procedure for Evaluating the Effectiveness
of the System of Continuous Counteraction
to Information Security Incidents
at the Facility |
M.YU. RYTOV, O.M. GOLEMBIOVSKAYA,
E.V. KONDRASHOVA, M.M. GOLEMBIOVSKY,
K.E. SHINAKOV
Countering information security incidents is one of the highest priorities in the fi eld of information protection. The statistics of
information security violations of various objects has a stable upward trend, mainly due to the appearance of a large number of vulnerabilities
in application and system software, which are actively used by hackers conducting cyber attacks. It is possible to prevent the implementation
of cyber attacks at the facility, as well as to neutralize or minimize possible consequences by building an information security incident
management system at the facility. It allows you to stop a cyberattack at the initial stages of its implementation and timely apply methods
to prevent possible losses. The article describes the main conditions for the formation of an effective system of continuous counteraction to
information security incidents at the facility, as well as the procedure for assessing the level of its effectiveness.
Keywords: incident, information security, counteraction, continuity.
DOI: 10.25791/pribor.3.2024.1485
Pp. 39-48. |
|
|
|
Last news:
Выставки по автоматизации и электронике «ПТА-Урал 2018» и «Электроника-Урал 2018» состоятся в Екатеринбурге Открыта электронная регистрация на выставку Дефектоскопия / NDT St. Petersburg Открыта регистрация на 9-ю Международную научно-практическую конференцию «Строительство и ремонт скважин — 2018» ExpoElectronica и ElectronTechExpo 2018: рост площади экспозиции на 19% и новые формы контент-программы Тематика и состав экспозиции РЭП на выставке "ChipEXPO - 2018" |