Ten serwis zostanie wyłączony 2025-02-11.
Nowa wersja platformy, zawierająca wyłącznie zasoby pełnotekstowe, jest już dostępna.
Przejdź na https://bibliotekanauki.pl
Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników

Znaleziono wyników: 2

Liczba wyników na stronie
first rewind previous Strona / 1 next fast forward last
Wyniki wyszukiwania
help Sortuj według:

help Ogranicz wyniki do:
first rewind previous Strona / 1 next fast forward last
EN
In the article, a modification of Formal Model of Risk Analysis FoMRA was proposed. The Modified FoMRA (1) method takes into account the guidelines of ISO/IEC 27001 and ISO/IEC 27005 standards. The applied modification and abstraction by resources and security controls (also called countermeasures) significantly shortened the time of risk weight calculation in comparison with the MEHARI method. An attempt was also made to further reduce the time of risk analysis using agents collecting information and data from various network nodes, from operating systems and devices, and additional agents containing information on reports on security procedures, security services, security management and organizational activities related to the information systems (maintenance, insurance, outsourcing contracts, etc.) and transfer it to the local FoMRA1 database. The obtained results indicate that the proposed method together with agents installed in various nodes enable a quick reaction to the system threats and prevention of their impacts (quasi-real-time security monitoring system).
2
Content available remote Load-balanced integrated information security monitoring system
100%
EN
Monitoring is the last step of the information security management process. It is intended to evaluate not the state of security itself, but rather the accuracy and quality of prior security evaluation and risk treatment applied. In other words, it is supposed to provide the answer, whether chosen countermeasures and all other decisions based on the security assessment and evaluation results were accurate, proper and sufficient. If during this phase of the security management process, any significant anomaly is found within the system, it means that either one of the accepted ‘as is' risks occurred, or that the applied countermeasures did not provide assumed protection in some point of the system. In such a case it is necessary to identify all the areas that require security audit repeat. As information systems grow in complexity, an integrated solution for security monitoring that will prevent system overload caused by monitoring is proposed in this paper.
first rewind previous Strona / 1 next fast forward last
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.