【24h】

CAF METHODOLOGY USAGE FOR MANAGEMENT OF THE INFORMATION SYSTEMS PROTECTION

机译:CAF方法论在管理信息系统中的用途

获取原文
获取原文并翻译 | 示例

摘要

Protection of critical infrastructures that are dependent on information systems becomes very actual in United States as well as in Europe. To achieve appropriate managerial control over this very complex issue is difficult and requires in depth oriented analysis of information system risk environment. Significant improvement of information systems protection is seriously limited by existing gap between architecture modeling and risk analysis and management. This gap has negative impact to final security protection strategy, which is designed on the base of risks identified during risk analysis stage. This article presents new approach to overcome this gap. We developed new methodology - CAF and set of tools that automate and synchronize both modeling processes. We briefly demonstrate some examples how this approach can be applied as a integral part of service delivery optimization.
机译:依赖信息系统的关键基础设施的保护在美国和欧洲变得非常实际。要对这个非常复杂的问题进行适当的管理控制是困难的,并且需要对信息系统风险环境进行深入的分析。架构建模与风险分析与管理之间的现有差距严重限制了信息系统保护的显着改善。这种差距会对最终的安全保护策略产生负面影响,该策略是基于在风险分析阶段确定的风险而设计的。本文提出了克服这种差距的新方法。我们开发了新的方法-CAF和用于自动化和同步两个建模过程的工具集。我们简要演示一些示例,说明如何将该方法用作服务交付优化的组成部分。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号