Tools for automatic collection of IT assets supporting information security process

M. Šterbák, P. Segec, Ján Jurč
{"title":"Tools for automatic collection of IT assets supporting information security process","authors":"M. Šterbák, P. Segec, Ján Jurč","doi":"10.1109/ICETA57911.2022.9974758","DOIUrl":null,"url":null,"abstract":"Information and communication technologies (ICT) and various computing resources, such as network devices, end devices, cloud services and storage and last, but not least, application software are an integral part of every organization. All these key information assets play an important role in organizations. IT assets serve to fulfil business goals and achieve the company's profit. For these reasons, great emphasis and priority has been placed on information and cyber security in recent years. At a time when IT extends in every domain, it is important for organizations to acquire and maintain a strong information and cyber security profile. Critical IT assets must be protected, and organizations see this as a complex problem. To ensure this goal, organizations are forced to use multiple tools that focuses on different aspects of security, including security processes as a security audit. Tools that cover the field of information and cyber security can be divided into several categories such as risk management tools, inventory tools, network scanning tools, and information gathering tools. The audit of information systems is becoming more and more demanding. This happens mainly due to the development of technologies and the emergence of new technological threats and associated risks. Therefore, it is necessary for auditors to have a wide theoretical knowledge and practical skills. And for the purpose of auditing, they are forced to use various available tools that cover various sub-processes. All this increases the complexity of the process and the demands placed on auditors. Risk management can be defined as pre-set and coordinated activities, the aim of which is to control the level of risk affecting the organization. A cyber security audit verifies and assesses the compliance of the security measures taken with the requirements, whether according to the law, standards, or special regulations. These paper presents our expanding research and further describes possible areas of automation of the risk management and audit process, which will make it easier for auditors to perform IT audits more often. We mainly focus on a comparative analysis of available software tools that cover one of the main sub-processes of the risk management. Namely information gathering and network scanning. The analysis outputs point to available tools suitable for automatization and that provides required information as inputs to mentioned subprocesses. The paper presents which of investigated tools are the most effective from the point of view of speed, the amount of information obtained, and the amount of knowledge needed to operate the tool.","PeriodicalId":151344,"journal":{"name":"2022 20th International Conference on Emerging eLearning Technologies and Applications (ICETA)","volume":"295 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 20th International Conference on Emerging eLearning Technologies and Applications (ICETA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICETA57911.2022.9974758","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Information and communication technologies (ICT) and various computing resources, such as network devices, end devices, cloud services and storage and last, but not least, application software are an integral part of every organization. All these key information assets play an important role in organizations. IT assets serve to fulfil business goals and achieve the company's profit. For these reasons, great emphasis and priority has been placed on information and cyber security in recent years. At a time when IT extends in every domain, it is important for organizations to acquire and maintain a strong information and cyber security profile. Critical IT assets must be protected, and organizations see this as a complex problem. To ensure this goal, organizations are forced to use multiple tools that focuses on different aspects of security, including security processes as a security audit. Tools that cover the field of information and cyber security can be divided into several categories such as risk management tools, inventory tools, network scanning tools, and information gathering tools. The audit of information systems is becoming more and more demanding. This happens mainly due to the development of technologies and the emergence of new technological threats and associated risks. Therefore, it is necessary for auditors to have a wide theoretical knowledge and practical skills. And for the purpose of auditing, they are forced to use various available tools that cover various sub-processes. All this increases the complexity of the process and the demands placed on auditors. Risk management can be defined as pre-set and coordinated activities, the aim of which is to control the level of risk affecting the organization. A cyber security audit verifies and assesses the compliance of the security measures taken with the requirements, whether according to the law, standards, or special regulations. These paper presents our expanding research and further describes possible areas of automation of the risk management and audit process, which will make it easier for auditors to perform IT audits more often. We mainly focus on a comparative analysis of available software tools that cover one of the main sub-processes of the risk management. Namely information gathering and network scanning. The analysis outputs point to available tools suitable for automatization and that provides required information as inputs to mentioned subprocesses. The paper presents which of investigated tools are the most effective from the point of view of speed, the amount of information obtained, and the amount of knowledge needed to operate the tool.
用于自动收集支持信息安全流程的IT资产的工具
信息和通信技术(ICT)和各种计算资源,如网络设备、终端设备、云服务和存储,以及最后但并非最不重要的应用软件,是每个组织不可或缺的一部分。所有这些关键信息资产在组织中都扮演着重要的角色。IT资产用于实现业务目标和实现公司利润。因此,近年来,信息和网络安全受到高度重视和重视。当IT扩展到每个领域时,组织获取和维护强大的信息和网络安全配置文件非常重要。关键的IT资产必须得到保护,而组织认为这是一个复杂的问题。为了确保实现这一目标,组织不得不使用多个工具来关注安全性的不同方面,包括作为安全审计的安全流程。涵盖信息和网络安全领域的工具可以分为风险管理工具、库存工具、网络扫描工具和信息收集工具等几类。对信息系统的审计要求越来越高。这主要是由于技术的发展和新技术威胁和相关风险的出现。因此,审计人员必须具备广泛的理论知识和实践技能。为了审计的目的,他们被迫使用各种可用的工具来覆盖各种子过程。所有这些都增加了审计过程的复杂性和对审计员的要求。风险管理可以定义为预先设定和协调的活动,其目的是控制影响组织的风险水平。网络安全审计是对所采取的安全措施是否符合要求进行验证和评估,无论是根据法律、标准还是特殊法规。本文介绍了我们的扩展研究,并进一步描述了风险管理和审计过程自动化的可能领域,这将使审核员更容易更频繁地执行it审计。我们主要集中于对涵盖风险管理的一个主要子过程的可用软件工具进行比较分析。即信息收集和网络扫描。分析输出指向适合于自动化的可用工具,并提供所需的信息作为上述子流程的输入。本文从速度、获得的信息量和操作工具所需的知识量的角度,介绍了所调查的工具中哪些是最有效的。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信