DEFINING REQUIREMENTS TO DEVELOP INFORMATION SECURITY CONCEPT N HYBRID THREATS CONDITIONS. PART 3

Yurii Borsukovskyi
{"title":"DEFINING REQUIREMENTS TO DEVELOP INFORMATION SECURITY CONCEPT N HYBRID THREATS CONDITIONS. PART 3","authors":"Yurii Borsukovskyi","doi":"10.28925/2663-4023.2019.5.6172","DOIUrl":null,"url":null,"abstract":"This article provides the modern cybersecurity trends directly related to aim ant tasks of criminals. It reflect the assessment of global technological risks discussed at 2020 World Economic Forum. The article covers estimations on increase on negative impact of geopolitical sharpness elements on economic potential of next generation technologies. Data fraud and cyberattacks are considered as priority key indicators at assessment of the most possible global risks, and attacks at informational infrastructure are equal to the cyberattacks risks at the rating of the most possible risks. Forecast indicates that cyberattacks are the most likely to be used as indirect conflicts between countries which look forward to expand their range on influence. In such situation the cybersecurity issues can`t stay on the second place or be the issues which should be solved at existence of direct cyber threats to the modern informational systems, IoT systems and SCADA. Obviously, we should revise the approaches to creation and development of modern informational technologies and cybersecurity issues should be considered as constituent element in development of modern informational systems from the very moment of its initiation, projecting, and on all stages of production and support. Reorientation of informational system developers to creation of new integrated platforms with cybersecurity constituent elements demands the research and implementation of new approaches to its development, as well as engagement of the world community at elaboration of relevant standards and protocols, which ensure the secure functioning of informational systems at world net. The article provides the basic requirements to constituent elements at development of concept of informational and cyber security in conditions of hybrid threats especially provides recommendations on organizational structure for informational security department and general principles to organize the activities and controls on informational and cyber protection. The article defines tasks for informational security department, provides the list of basic actions to secure information, and formulates the tasks, which should be ensured by technical infrastructure, organizational, procedural and hardware and technical actions to manage the informational security, and other principles to ensure informational security in development of concept of informational security within the hybrid threats conditions.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2019-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Cybersecurity: Education, Science, Technique","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.28925/2663-4023.2019.5.6172","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

This article provides the modern cybersecurity trends directly related to aim ant tasks of criminals. It reflect the assessment of global technological risks discussed at 2020 World Economic Forum. The article covers estimations on increase on negative impact of geopolitical sharpness elements on economic potential of next generation technologies. Data fraud and cyberattacks are considered as priority key indicators at assessment of the most possible global risks, and attacks at informational infrastructure are equal to the cyberattacks risks at the rating of the most possible risks. Forecast indicates that cyberattacks are the most likely to be used as indirect conflicts between countries which look forward to expand their range on influence. In such situation the cybersecurity issues can`t stay on the second place or be the issues which should be solved at existence of direct cyber threats to the modern informational systems, IoT systems and SCADA. Obviously, we should revise the approaches to creation and development of modern informational technologies and cybersecurity issues should be considered as constituent element in development of modern informational systems from the very moment of its initiation, projecting, and on all stages of production and support. Reorientation of informational system developers to creation of new integrated platforms with cybersecurity constituent elements demands the research and implementation of new approaches to its development, as well as engagement of the world community at elaboration of relevant standards and protocols, which ensure the secure functioning of informational systems at world net. The article provides the basic requirements to constituent elements at development of concept of informational and cyber security in conditions of hybrid threats especially provides recommendations on organizational structure for informational security department and general principles to organize the activities and controls on informational and cyber protection. The article defines tasks for informational security department, provides the list of basic actions to secure information, and formulates the tasks, which should be ensured by technical infrastructure, organizational, procedural and hardware and technical actions to manage the informational security, and other principles to ensure informational security in development of concept of informational security within the hybrid threats conditions.
定义在混合威胁条件下发展信息安全概念的需求。第3部分
本文提供了与犯罪分子的目标任务直接相关的现代网络安全趋势。它反映了2020年世界经济论坛讨论的全球技术风险评估。本文涵盖了对地缘政治尖锐因素对下一代技术经济潜力的负面影响增加的估计。在最可能的全球风险评估中,数据欺诈和网络攻击被视为优先关键指标,在最可能的风险评级中,对信息基础设施的攻击等同于网络攻击风险。预测表明,网络攻击最有可能被用作希望扩大其影响范围的国家之间的间接冲突。在这种情况下,网络安全问题不能停留在第二位,也不能成为现代信息系统、物联网系统和SCADA存在直接网络威胁时应该解决的问题。显然,我们应该修改现代信息技术的创造和发展方法,网络安全问题应从现代信息系统的启动,投射以及生产和支持的各个阶段开始被视为现代信息系统发展的组成要素。信息系统开发者的重新定位是创建具有网络安全组成要素的新集成平台,这需要研究和实施其发展的新方法,以及国际社会参与制定相关标准和协议,以确保世界网络信息系统的安全运行。本文提出了在混合威胁条件下信息和网络安全概念发展对构成要素的基本要求,特别是对信息安全部门的组织结构和组织信息和网络保护活动和控制的一般原则提出了建议。文章明确了信息安全部门的任务,给出了信息安全的基本行动清单,并在信息安全概念发展的混合威胁条件下,制定了技术基础设施、组织、程序和硬件、管理信息安全的技术行动等确保信息安全的任务,以及确保信息安全的原则。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信