Preview

Proceedings of Telecommunication Universities

Advanced search

SECURING A DISTRIBUTED INFORMATION NETWORK, TAKING INTO ACCOUNT RISK MANAGEMENT

Abstract

Information and computer networks, combining into a single system all departments and branches, can work together in centralized or distributed applications, databases and other services. One of the main tasks of ensuring the necessary level of security of such networks is the risk management process, which allows to make every effort to protect against the most likely threats. The article analyzes the importance of risk management in the process of information security, anddescribes the risk-oriented method of construction of a secure distributed network developed based on leading standards and recommendations.

About the Authors

N. Pihovkin
Санкт-Петербургский государственный университет телекоммуникаций им. проф. М.А. Бонч-Бруевича
Russian Federation


D. Sakharov
Санкт-Петербургский государственный университет телекоммуникаций им. проф. М.А. Бонч-Бруевича
Russian Federation


References

1. Кармановский Н.С., Михайличенко О.В., Прохожев Н.Н. Организационно-правовое и методическое обеспечение информационной безопасности. СПб.: Университет ИТМО, 2016. 168 с.

2. Steven Hernandez. Official (ISC)2 Guide to the CISSP CBK, Third Edition. ISC2 Press, 2012. 968 с.

3. ГОСТ Р ИСО/МЭК 27005-2010. Информационная технология. Методы и средства обеспечения безопасности. Менеджмент риска информационной безопасности. М.: Издательство стандартов, 2010. 51 с.


Review

For citations:


Pihovkin N., Sakharov D. SECURING A DISTRIBUTED INFORMATION NETWORK, TAKING INTO ACCOUNT RISK MANAGEMENT. Proceedings of Telecommunication Universities. 2016;2(2):93-97. (In Russ.)

Views: 215


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 1813-324X (Print)
ISSN 2712-8830 (Online)