DEFINING REQUIREMENTS TO DEVELOP INFORMATION SECURITY CONCEPT N HYBRID THREATS CONDITIONS. PART 3
DOI:
https://doi.org/10.28925/2663-4023.2020.8.3448Keywords:
threats, risks, classification, cyber security, strategy, conceptAbstract
This article provides the modern cybersecurity trends directly related to aim ant tasks of criminals. It reflect the assessment of global technological risks discussed at 2020 World Economic Forum. The article covers estimations on increase on negative impact of geopolitical sharpness elements on economic potential of next generation technologies. Data fraud and cyberattacks are considered as priority key indicators at assessment of the most possible global risks, and attacks at informational infrastructure are equal to the cyberattacks risks at the rating of the most possible risks. Forecast indicates that cyberattacks are the most likely to be used as indirect conflicts between countries which look forward to expand their range on influence. In such situation the cybersecurity issues can`t stay on the second place or be the issues which should be solved at existence of direct cyber threats to the modern informational systems, IoT systems and SCADA. Obviously, we should revise the approaches to creation and development of modern informational technologies and cybersecurity issues should be considered as constituent element in development of modern informational systems from the very moment of its initiation, projecting, and on all stages of production and support. Reorientation of informational system developers to creation of new integrated platforms with cybersecurity constituent elements demands the research and implementation of new approaches to its development, as well as engagement of the world community at elaboration of relevant standards and protocols, which ensure the secure functioning of informational systems at world net. The article provides the basic requirements to constituent elements at development of concept of informational and cyber security in conditions of hybrid threats especially provides recommendations on organizational structure for informational security department and general principles to organize the activities and controls on informational and cyber protection. The article defines tasks for informational security department, provides the list of basic actions to secure information, and formulates the tasks, which should be ensured by technical infrastructure, organizational, procedural and hardware and technical actions to manage the informational security, and other principles to ensure informational security in development of concept of informational security within the hybrid threats conditions.
Downloads
References
The Global Risks Report 2020. [Online]. Available: http://bit.ly/2SIV9FX. [Accessed: 17 February 2020]
Borsukovskii Y.V., Borsukovska V.Y., Buriachok V.L. «Directions for creation of informational security policies for the state, banking and private sectors», Modern Methodologies, Innovations, and Operational Experience on the Field of Technical Science: Conference proceedings, December 27-28, 2017, Radom, Republic of Poland, p. 8-11
Borsukovska V.Y., Borsukovskii Y.V. «Business Continuity: new trend or necessity», Economy. Management. Business. - 2017, № 2(20), с. 48-52
Borsukovskii Y.V., Buriachok V.L., Borsukovska V.Y. «Basic ways to ensure cyber security of state and private sectors», Modern Information Security, - 2017, № 2(30), с. 85-89
Borsukovskyi Y.V., «Defining requirements to develop information security concept n hybrid threats conditions. Part 1», Cybersecurity: education, science, technique, - 2019, №1(5), p. 61-72 https://doi.org/10.28925/2663-4023.2019.5.6172
Borsukovskyi Y.V., «Defining requirements to develop information security concept n hybrid threats conditions. Part 2», Cybersecurity: education, science, technique, - 2019, №2(6), p. 112-121 https://doi.org/10.28925/2663-4023.2019.6.112121
On cyber threats at Davos. [Online]. Available: http://bit.ly/2V5cbj9. [Accessed: 17 February 2020]
World Economic Forum report discusses the Wild Wide Web. [Online]. Available: http://bit.ly/2PctdbA. [Accessed: 17 February 2020]
These are the top risks facing the world in 2020. [Online]. Available: http://bit.ly/2SKBCoJ. [Accessed: 17 February 2020]
ISO/IEC 27000:2015. Information technology. Security techniques. Information security management systems. Overview and vocabulary (ISO/IEC 27000:2014 IDT).
OCT 45.127-99. Система обеспечения информационной безопасности взаимоувязанной сети связи РФ. Термины и определения. [Online]. Available: http://bit.ly/39OOa3Z. [Accessed: 17 February 2020]
Iryna Muravyova. New vision for company security service. [Online]. Available: http://bit.ly/38Jp6eN. [Accessed: 17 February 2020]
2019 Internet Crime Report. [Online]. Available: http://bit.ly/2vNs2Zi. [Accessed: 17 February 2020]
These will be the main cybersecurity trends in 2020. [[Online]. Available: http://bit.ly/2HEfV3d. [Accessed: 17 February 2020]