Comparison of Information Security Systems for Asymptotic Information Security Management Critical Information Infrastructures

The article reviews the options for critical information infrastructures (CII) protection management and discusses approaches to developing security policies that dont lean on assessing residual risks and identifying a fixed list of threats. We examine and substantiate the possibility of building in...

Full description

Bibliographic Details
Main Authors: Sergey Erokhin, Andrey Petukhov, Pavel Pilyugin
Format: Article
Language:English
Published: FRUCT 2021-01-01
Series:Proceedings of the XXth Conference of Open Innovations Association FRUCT
Subjects:
Online Access:https://www.fruct.org/publications/fruct28/files/Ero.pdf