【24h】

CAF METHODOLOGY USAGE FOR MANAGEMENT OF THE INFORMATION SYSTEMS PROTECTION

机译:CAF方法论在管理信息系统中的用途

获取原文
获取原文并翻译 | 示例

摘要

Protection of critical infrastructures that are dependent on information systems becomes very actual in United States as well as in Europe. To achieve appropriate managerial control over this very complex issue is difficult and requires in depth oriented analysis of information system risk environment.rnSignificant improvement of information systems protection is seriously limited by existing gap between architecture modeling and risk analysis and management. This gap has negative impact to final security protection strategy, which is designed on the base of risks identified during risk analysis stage.rnThis article presents new approach to overcome this gap. We developed new methodology - CAF and set of tools that automate and synchronize both modeling processes. We briefly demonstrate some examples how this approach can be applied as a integral part of service delivery optimization.
机译:依赖信息系统的关键基础设施的保护在美国和欧洲变得非常实际。要对这个非常复杂的问题进行适当的管理控制是困难的,并且需要对信息系统风险环境进行深入的分析。信息系统保护的显着改进受到体系结构建模与风险分析与管理之间现有差距的严重限制。此漏洞对最终安全保护策略有负面影响,该策略是基于在风险分析阶段确定的风险而设计的。本文提出了克服此漏洞的新方法。我们开发了新的方法-CAF和用于自动化和同步两个建模过程的工具集。我们简要演示一些示例,说明如何将该方法用作服务交付优化的组成部分。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号