{"title":"关键信息基础设施安全管理","authors":"S. Erokhin","doi":"10.1109/SYNCHROINFO.2019.8814097","DOIUrl":null,"url":null,"abstract":"The article provides a description of the main legal acts in the field of creating objects of Critical Information Infrastructure (CII). Various methods of information security threats modeling for objects CII are considered. It is proposed to use technique Security Development Lifecycle (SDL) for threat modeling CII.","PeriodicalId":363848,"journal":{"name":"2019 Systems of Signal Synchronization, Generating and Processing in Telecommunications (SYNCHROINFO)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Managing Security of Critical Information Infrastructure\",\"authors\":\"S. Erokhin\",\"doi\":\"10.1109/SYNCHROINFO.2019.8814097\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The article provides a description of the main legal acts in the field of creating objects of Critical Information Infrastructure (CII). Various methods of information security threats modeling for objects CII are considered. It is proposed to use technique Security Development Lifecycle (SDL) for threat modeling CII.\",\"PeriodicalId\":363848,\"journal\":{\"name\":\"2019 Systems of Signal Synchronization, Generating and Processing in Telecommunications (SYNCHROINFO)\",\"volume\":\"45 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 Systems of Signal Synchronization, Generating and Processing in Telecommunications (SYNCHROINFO)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SYNCHROINFO.2019.8814097\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 Systems of Signal Synchronization, Generating and Processing in Telecommunications (SYNCHROINFO)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SYNCHROINFO.2019.8814097","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Managing Security of Critical Information Infrastructure
The article provides a description of the main legal acts in the field of creating objects of Critical Information Infrastructure (CII). Various methods of information security threats modeling for objects CII are considered. It is proposed to use technique Security Development Lifecycle (SDL) for threat modeling CII.