SECURING A DISTRIBUTED INFORMATION NETWORK, TAKING INTO ACCOUNT RISK MANAGEMENT
Abstract
Information and computer networks, combining into a single system all departments and branches, can work together in centralized or distributed applications, databases and other services. One of the main tasks of ensuring the necessary level of security of such networks is the risk management process, which allows to make every effort to protect against the most likely threats. The article analyzes the importance of risk management in the process of information security, anddescribes the risk-oriented method of construction of a secure distributed network developed based on leading standards and recommendations.
About the Authors
N. PihovkinRussian Federation
D. Sakharov
Russian Federation
References
1. Кармановский Н.С., Михайличенко О.В., Прохожев Н.Н. Организационно-правовое и методическое обеспечение информационной безопасности. СПб.: Университет ИТМО, 2016. 168 с.
2. Steven Hernandez. Official (ISC)2 Guide to the CISSP CBK, Third Edition. ISC2 Press, 2012. 968 с.
3. ГОСТ Р ИСО/МЭК 27005-2010. Информационная технология. Методы и средства обеспечения безопасности. Менеджмент риска информационной безопасности. М.: Издательство стандартов, 2010. 51 с.
Review
For citations:
Pihovkin N., Sakharov D. SECURING A DISTRIBUTED INFORMATION NETWORK, TAKING INTO ACCOUNT RISK MANAGEMENT. Proceedings of Telecommunication Universities. 2016;2(2):93-97. (In Russ.)