【24h】

Taxonomy for unsecure digital information processing

机译:用于不安全数字信息处理的分类

获取原文

摘要

At a time when the media constantly reports about new sophisticated attacks, organizations of any business and size need to be prepared for such attacks against their IT infrastructures. To reflect the attacks organizations should have a properly designed information security (IS) management system with adequate documentation support. Among the most important documents, there are IS policies for different application areas, including an IS incident management policy. In order to create a truly effective IS policy it is necessary to adequately describe the organization's business environment from the IS viewpoint. The paper presents four most demand for these purposes classifications (taxonomy) of IS threats, vulnerabilities, attacks and IS incidents as the negative elements that should be avoided.
机译:在媒体不断报告新的复杂攻击时,需要准备任何业务和大小的组织对其IT基础架构的这种攻击。为了反映攻击组织应具有适当设计的信息安全(IS)管理系统,具有足够的文档支持。在最重要的文件中,有不同应用领域的政策,包括事件管理政策。为了创建真正有效的政策,有必要充分描述本组织的业务环境。本文为这些目的进行了四个,对这些目的的需求(分类)是威胁,脆弱性,攻击以及应避免的负面元素的事件。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号