...
首页> 外文期刊>ITB Journal of Information and Communication Technology >Comprehensiveness of Response to Internal Cyber-Threat and Selection of Methods to Identify the Insider
【24h】

Comprehensiveness of Response to Internal Cyber-Threat and Selection of Methods to Identify the Insider

机译:对内部网络威胁的反应的全面性和识别内部人的方法的选择

获取原文
           

摘要

A range of international regulatory documents state the importance of counteracting insiders, especially cyber-insiders, in ?critical facilities and simultaneously providing complex protection, which includes technical, administrative and information protection. In that case the insider, who is familiar with the protection or information system, will be able to find vulnerabilities and weak points in the protection of the information system or control system. One of the most important aspects of the preventive measures against insiders is personnel checks using different techniques, including interviews, social network analysis, and local area network analysis. In the case of having limited financial resources, it is necessary to choose a technique from a checklist rationally.Full Text:PDFReferencesShemigon N.N.andPetrakov A.V., Protection of Objects: Machinery and Technology, Energoatomizdat, Moscow, 2005.
机译:一系列国际法规文件阐明了在关键设施中抵制内部人员,特别是网络内部人员并同时提供包括技术,行政和信息保护在内的复杂保护的重要性。在这种情况下,熟悉保护或信息系统的内部人员将能够发现信息系统或控制系统的漏洞和弱点。预防内部人的措施中最重要的方面之一是使用面试,社交网络分析和局域网分析等不同技术进行人员检查。在财务资源有限的情况下,有必要从清单中合理选择一种技术。全文:PDF参考文献Shemigon N.N.和Petrakov A.V.,《物体的保护:机械和技术》,Energoatomizdat,莫斯科,2005年。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号