A. Baranchikov, N. N. Grinchenko, G. V. Svetlov, N. S. Fokina
{"title":"企业信息系统信息保护系统设计的特点","authors":"A. Baranchikov, N. N. Grinchenko, G. V. Svetlov, N. S. Fokina","doi":"10.1109/MECO.2019.8760008","DOIUrl":null,"url":null,"abstract":"The article is devoted to the aspects of smaller information systems, their modern features and the possibility of working with limited resources allocated for information protection. The article analyzes the security of the system prior to the implementation of the proposed security policy based on the methodology for analyzing threats and vulnerabilities. The authors propose an approach to reduce the risks associated with the probability of loss, distortion, and data compromise. On the basis of the research, the benefits associated with the implementation of the proposed measures are shown.","PeriodicalId":141324,"journal":{"name":"2019 8th Mediterranean Conference on Embedded Computing (MECO)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"The Characteristics of the Information Protection Systems Design for Corporate Information Systems\",\"authors\":\"A. Baranchikov, N. N. Grinchenko, G. V. Svetlov, N. S. Fokina\",\"doi\":\"10.1109/MECO.2019.8760008\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The article is devoted to the aspects of smaller information systems, their modern features and the possibility of working with limited resources allocated for information protection. The article analyzes the security of the system prior to the implementation of the proposed security policy based on the methodology for analyzing threats and vulnerabilities. The authors propose an approach to reduce the risks associated with the probability of loss, distortion, and data compromise. On the basis of the research, the benefits associated with the implementation of the proposed measures are shown.\",\"PeriodicalId\":141324,\"journal\":{\"name\":\"2019 8th Mediterranean Conference on Embedded Computing (MECO)\",\"volume\":\"10 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 8th Mediterranean Conference on Embedded Computing (MECO)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MECO.2019.8760008\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 8th Mediterranean Conference on Embedded Computing (MECO)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MECO.2019.8760008","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The Characteristics of the Information Protection Systems Design for Corporate Information Systems
The article is devoted to the aspects of smaller information systems, their modern features and the possibility of working with limited resources allocated for information protection. The article analyzes the security of the system prior to the implementation of the proposed security policy based on the methodology for analyzing threats and vulnerabilities. The authors propose an approach to reduce the risks associated with the probability of loss, distortion, and data compromise. On the basis of the research, the benefits associated with the implementation of the proposed measures are shown.