Trudy SPIIRAN
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
General information
Latest issue
Archive

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



Informatics and Automation:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


Trudy SPIIRAN, 2012, Issue 23, Pages 80–92 (Mi trspy501)  

This article is cited in 1 scientific paper (total in 1 paper)

The approaches for model’s synthesis of private data security assessment in accordance with ISO/IEC 27001:2005 standards requirements.

I. Livshitz

St. Petersburg Institute for Informatics and Automation of RAS
Full-text PDF (696 kB) Citations (1)
References:
Abstract: The analysis of recent publications concerning an approaches to design, implementation and maintenance of the systems for personal data (PD) protection enables to note consistently high interest in this critical problem in the aspect of ensuring information security. Sure, the proposed models based on both International and Russian standards indicate deep-in-side knowledge of all aspects of protection PD, but at the same time present new questions, an effective solution of which has yet to be synthesized and tested in practice. The present article provides some approaches for creating models of PD security assessment in accordance with the requirements of standard GOST R ISO/IEC 27001:2005. Taking into account the relative newness of this standard as applied to the research problem, the proposed approaches can be useful in planning security systems PD, security assessment of designed ITSecurity with PD and, in particular, in solving of practical problems - IT-Security audits in organizations.
Keywords: information security.
Received: 09.05.2012
Document Type: Article
UDC: 004.94
Language: Russian
Citation: I. Livshitz, “The approaches for model’s synthesis of private data security assessment in accordance with ISO/IEC 27001:2005 standards requirements.”, Tr. SPIIRAN, 23 (2012), 80–92
Citation in format AMSBIB
\Bibitem{Liv12}
\by I.~Livshitz
\paper The approaches for model’s synthesis of private data security assessment in accordance with ISO/IEC 27001:2005 standards requirements.
\jour Tr. SPIIRAN
\yr 2012
\vol 23
\pages 80--92
\mathnet{http://mi.mathnet.ru/trspy501}
Linking options:
  • https://www.mathnet.ru/eng/trspy501
  • https://www.mathnet.ru/eng/trspy/v23/p80
  • This publication is cited in the following 1 articles:
    Citing articles in Google Scholar: Russian citations, English citations
    Related articles in Google Scholar: Russian articles, English articles
    Informatics and Automation
    Statistics & downloads:
    Abstract page:640
    Full-text PDF :86
    References:47
    First page:1
     
      Contact us:
     Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2024