Library
|
Your profile |
National Security
Reference:
Tsaregorodtsev, A.V., Ermoshkin, G.N.
Basic principles for the formation of the
tree of objectives for information security
in the cloud computing.
// National Security.
2013. № 5.
P. 69-79.
URL: https://en.nbpublish.com/library_read_article.php?id=63358
Tsaregorodtsev, A.V., Ermoshkin, G.N. Basic principles for the formation of the tree of objectives for information security in the cloud computing.Abstract: Changing security contour and loss of internal control over the critical assets of organizations followed by the later migration of these assets to the cloud spheres made the problem of information cloud computing security management in the corporate system a top priority issue. All of the above requires the change in the traditional approaches to the information security guarantees and development of the novel methodological apparatus, allowing for higher efficiency of the IT resources and considerably lowering their costs via diversification of information streams in the organization and their migration to the cloud architecture. Much attention is paid to the topical information security problems and their possible solutions based on formation of the trees of objectives for the information security in the cloud computing environment. The authors offer a novel concept for the cloud computing environment security based upon the tree of objectives, allowing to take into account all of the critical processes in the sphere of information security management, and to take into consideration the terms of common responsibility and common obligations of the parties, the above-mentioned qualities shall allow the organizations to make decisions on the formation of information network based on the criterion of minimal infrastructure costs, while guaranteeing the necessary information security level. Keywords: i n for mat ion secu r it y, cloud computing, cloud services, information security threats, tree of objectives, management methods, information security requirements, service provision model, counter-measures, business processes.
This article can be downloaded freely in PDF format for reading. Download article
References
1. Chen I. Pekson I., Pekson V., (2010) Novye problemy informatsionnoy bezopasnosti oblakov. Tekhnicheskiy otchet UCB/EECS-2010-5, Departament EECS, Universitet Kalifornii, Berkli.
2. Ouns S. (2010) Elastichnaya bezopasnost' v oblachnykh tekhnologiyakh. Izdatel'stvo Commun ACM 53(6): S. 46-51. 3. Tsaregorodtsev A.V., Kislitsyn A.S. Osnovy sinteza zashchishchennykh telekommunikatsionnykh sistem. – M.: Radiotekhnika, 2006.-244 s. 4. Tsaregorodtsev A.V., Kachko A.K. Obespechenie informatsionnoy bezopasnosti na oblachnoy arkhitekture organizatsii // Natsional'naya bezopasnost'. – M.: Izd-vo "NB Media", 2011.-№ 5. – S. 25-34. 5. Otchet ENISA: Oblachnye vychisleniya: Preimushchestva, riski i rekomendatsii po upravleniyu bezopasnost'yu (2009) Tekhnicheskiy otchet, Evropeyskoe agentstvo po setevoy i informatsionnoy bezopasnosti. |