Comparison of Information Security Systems for Asymptotic Information Security Management Critical Information Infrastructures
The article reviews the options for critical information infrastructures (CII) protection management and discusses approaches to developing security policies that dont lean on assessing residual risks and identifying a fixed list of threats. We examine and substantiate the possibility of building in...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
FRUCT
2021-01-01
|
Series: | Proceedings of the XXth Conference of Open Innovations Association FRUCT |
Subjects: | |
Online Access: | https://www.fruct.org/publications/fruct28/files/Ero.pdf |