Identyfikatory
Warianty tytułu
Zasady ochrony informacji niejawnych przetwarzanych w systemach teleinformatycznych w ramach realizacji projektów naukowo-badawczych Europejskiej Agencji Obrony
Języki publikacji
Abstrakty
The article presents the aspects of Communication and Information Systems security principles for classified Information Security Management System implemented within the realization of European Defence Agency research and technology projects. In the content of article, author characterised the rules and procedures, resulting from the legal acts, which regulates IT security procedures of classified information processing, obtained during the realisation of research process. Special attention has been focused on the European Defence Agency projects during which common IT security procedures are very important to provide not only the proper level of secrecy but also to ensure confidentiality, integrity and availability of all information processed during the research process.
W artykule zaprezentowano aspekty organizacji ochrony systemów teleinformatycznych wykorzystywanych w ramach systemu zarządzania bezpieczeństwem informacji niejawnych wytwarzanych, przetwarzanych i przechowywanych dla potrzeb realizacji prac naukowo-badawczych Europejskiej Agencji Obrony. Przedstawiono zasady oraz procedury wynikające z uregulowań prawnych normujących przetwarzanie informacji klauzulowanych w systemach teleinformatycznych. Szczególną uwagę zwrócono na zachowanie podstawowych cech sytemu ochrony informacji mających na celu zapewnienie poufności, integralności oraz dostępności informacji wytworzonych w trakcie realizacji procesu badawczego.
Słowa kluczowe
Czasopismo
Rocznik
Tom
Strony
87--100
Opis fizyczny
Bibliogr. 16 poz., tab.
Twórcy
autor
- Polish Naval Academy, Faculty of Navigation and Naval Weapons, Śmidowicza 69 Str., 81-127 Gdynia, Poland
Bibliografia
- [1] Buszman K., Listewnik K., Sobczynski T., Sensitive and Classified Data Exchange and Handling in the EU. A Case Study, ‘Journal of Information System Security’, 2015, Vol. 11, No. 2, pp. 149–168, Information Institute Publishing, Washington DC, USA.
- [2] Council Decision of 31 March 2011 on the security rules for protecting EU classified information (2011/292/EU).
- [3] Directive 2009/81/EC of the European Parliament and of the Council of 13 July 2009 on the coordination of procedures for the award of certain works contracts, supply contracts and service contracts by contracting authorities or entities in the fields of defence and security, and amending Directives 2004/17/EC and 2004/18/EC.
- [4] Elsea J. K., The Protection of Classified Information. The Legal Framework, Congressional Research Service 7-5700, Washington, 10 January 2013.
- [5] Information Security Risk Assessment. Practices of Leading Organizations, Accounting and Information Management Division Executive, GAO Guide on Information Security Management, 1999.
- [6] ISO/IEC 13335-1:2004, Information technology. Security techniques. Management of information and communications technology security, Part 1, Concepts and models for information and communications technology security management.
- [7] ISO/IEC 27001:2013, Information technology. Security techniques. Information security management systems. Requirements.
- [8] ISO/IEC 27002:2013, Information technology. Security techniques. Code of practice for information security controls.
- [9] ISO/IEC 27005:2011, Information technology. Security techniques. Information security risk management.
- [10] ISO/IEC 27005:2011, Information technology. Security techniques. Information security management system implementation guidance.
- [11] Monahan G., Enterprise Risk Management. A Methodology for Achieving Strategic Objectives, John Wiley & Sons, 2008.
- [12] NIST SP 800-30, Risk Management Guide for Information Technology System, Recommendations of the National Institute of Standards and Technology.
- [13] Taylor A., Alexander D., Finch A., Sutton D., Information Security Management Principles, The British Computer Society, 2008.
- [14] The Treaty of Rome, 25 March 1957.
- [15] http://www.eda.europa.eu/info-hub/data-protection [access 27.08.2016]
- [16] https://www.enisa.europa.eu/activities/risk-management [access 27.08.2016].
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-a22c8ba2-9fbd-4ca0-8c79-b116252cb02e