{"title":"Managing Security of Critical Information Infrastructure","authors":"S. Erokhin","doi":"10.1109/SYNCHROINFO.2019.8814097","DOIUrl":null,"url":null,"abstract":"The article provides a description of the main legal acts in the field of creating objects of Critical Information Infrastructure (CII). Various methods of information security threats modeling for objects CII are considered. It is proposed to use technique Security Development Lifecycle (SDL) for threat modeling CII.","PeriodicalId":363848,"journal":{"name":"2019 Systems of Signal Synchronization, Generating and Processing in Telecommunications (SYNCHROINFO)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 Systems of Signal Synchronization, Generating and Processing in Telecommunications (SYNCHROINFO)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SYNCHROINFO.2019.8814097","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
The article provides a description of the main legal acts in the field of creating objects of Critical Information Infrastructure (CII). Various methods of information security threats modeling for objects CII are considered. It is proposed to use technique Security Development Lifecycle (SDL) for threat modeling CII.