首页> 外文期刊>Technological and Economic Development of Economy >CONTROLS-BASED APPROACH FOR EVALUATION OF INFORMATION SECURITY STANDARDS IMPLEMENTATION COSTS
【24h】

CONTROLS-BASED APPROACH FOR EVALUATION OF INFORMATION SECURITY STANDARDS IMPLEMENTATION COSTS

机译:基于控制信息安全标准实施成本的控制方法

获取原文
获取原文并翻译 | 示例
           

摘要

According to the PricewaterhouseCoopers analysis, the average cost of a single information security and data protections breaches has increased twice during 2015 (Pricewaterhouse Coopers 2015). Amount of organizations who reported serious breach has also risen (from 9% in 2015 to 17% in 2016) (PricewaterhouseCoopers 2016). To achieve their goals criminals are using different techniques starting from Social engineering (phishing, whaling) and finishing with malware execution (such as ransomware) on target machines. Recent attacks (attack on Central Bank of Bangladesh, fraud attack on Mattel CEO and attack on Thailand state-run Government bank ATM) show, that criminals are very well organized, equipped and spend a lot of money and time to prepare their attacks. To protect themselves organizations are required to ensure security in depth principles and implement complex Security solutions, which are able to ensure the needed level of information security in appropriate costs.
机译:根据普华永道(Pricewaterhouse Coopers)的分析,在2015年,单个信息安全和数据保护漏洞的平均成本增加了两倍(普华永道2015)。报告严重违规的组织数量也有所上升(从2015年的9%上升到2016年的17%)(普华永道2016)。为了实现他们的目标,犯罪分子正在使用不同的技术,从社会工程(钓鱼、捕鲸)开始,到在目标机器上执行恶意软件(如勒索软件)结束。最近的袭击(针对孟加拉国中央银行的袭击、针对美泰首席执行官的欺诈袭击以及针对泰国国有政府银行ATM的袭击)表明,犯罪分子组织严密、装备精良,并花费大量资金和时间准备袭击。为了保护自身,组织需要确保深入的安全原则和实施复杂的安全解决方案,这些解决方案能够以适当的成本确保所需的信息安全级别。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号