2017 20th Conference of Open Innovations Association (FRUCT) 2017
DOI: 10.23919/fruct.2017.8071319
|View full text |Cite
|
Sign up to set email alerts
|

The optimization method of the integrated management system security audit

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 1 publication
0
1
0
Order By: Relevance
“…Specific features of information protection focus on existing methods of localization of anomalies and current hazards in networks, statistical methods are considered as effective methods of detecting anomalies and experimental detection of the chosen method, methods of capturing and analyzing network traffic during passive monitoring of network segment [13][14][15][16][17][18]. The analysis of different areas of information security management in organizations of various activities is not left out: the management of information security system resources in the organization [19][20][21]; risk management and threats to information security [20,22,23]; management of documentation and information assistance system in the organization [19,20,24,25]; information security audit management [23,26,27]; management of information security system efficiency analysis [19,21,28]. Some sources are associated with the use of different forecasting methods based on the construction of appropriate models [29][30][31][32][33][34][35].…”
Section: Related Workmentioning
confidence: 99%
“…Specific features of information protection focus on existing methods of localization of anomalies and current hazards in networks, statistical methods are considered as effective methods of detecting anomalies and experimental detection of the chosen method, methods of capturing and analyzing network traffic during passive monitoring of network segment [13][14][15][16][17][18]. The analysis of different areas of information security management in organizations of various activities is not left out: the management of information security system resources in the organization [19][20][21]; risk management and threats to information security [20,22,23]; management of documentation and information assistance system in the organization [19,20,24,25]; information security audit management [23,26,27]; management of information security system efficiency analysis [19,21,28]. Some sources are associated with the use of different forecasting methods based on the construction of appropriate models [29][30][31][32][33][34][35].…”
Section: Related Workmentioning
confidence: 99%