About the single system of protection classes of elements of critical information infrastructure by the criteria of importance and information security

  • Authors

    • Andey O. Kalashniov
    • Igor F. Mik halevich

    Received date: April 23, 2018

    Accepted date: April 23, 2018

    Published date: April 20, 2018

    https://doi.org/10.14419/ijet.v7i2.23.11952
  • Use about five key words or phrases in alphabetical order, Separated by Semicolon.
  • Abstract

    In work on the basis of integration of criteria of elements of importance for critical information infrastructure and information security, and single network security trust model, a single system of protection classes of elements of critical information infrastructure is developed.

     

     

  • References

    1. [1] International standard ISO/IEC 27000:2018, “Information security management systems - Overview and vocabularyâ€, Geneva: ISO, 2018, 19 p.

      [2] International standard ISO/IEC 27001:2013, “Information security management systems — Requirementsâ€, Geneva: ISO, 2014, 48 p.

      [3] International standard ISO/IEC 13335-1:2004, “Management of information and communications technology security - Part 1: Concepts and models for information and communications technology security managementâ€, Geneva: ISO, 2004, 28 p.

      [4] ITU-T Recommendation Y.2701, “Security requirements for NGN release 1â€, Geneva: ITU-T, 2008, 44 p.

      [5] ITU-T Recommendation X.805, “Security architecture for systems providing end-to-end communicationsâ€, Geneva: ITU-T, 2008, 28 p.

      [6] Igor F. Mikhalevich, “Problems of creation of the entrusted environment of functioning of automated control systems in the protected executionâ€, Works XII of the All-Russian meeting on control problems (ARMCP-2014, Moscow), Moscow: ICS of RAC, 2014, pp. 9201-9207.

  • Downloads

  • How to Cite

    O. Kalashniov, A., & F. Mik halevich, I. (2018). About the single system of protection classes of elements of critical information infrastructure by the criteria of importance and information security. International Journal of Engineering and Technology, 7(2.23), 247-250. https://doi.org/10.14419/ijet.v7i2.23.11952

    Received date: April 23, 2018

    Accepted date: April 23, 2018

    Published date: April 20, 2018