To obtain access to full text of journal and articles you must register!
- Article name
- Analysis of the toxic assets to IT-security assessment
- Authors
- Livshits I. I., , Livshitz.il@yandex.ru, LLC "GasInformService", St.-Petersburg, Russia
Nekludov A. V., , nav7ad@mail.ru, LLC "GasInformService", St.-Petersburg, Russia
- Keywords
- information security / integrated management system / standard / IT-security Management System / asset
- Year
- 2017 Issue 1 Pages 46 - 57
- Code EDN
- Code DOI
- Abstract
- The IT revolution, which had been in the late nineteenth century, had a very interesting consequence. During the revolution the issues of Information securityalmost completely lost its independence and become an organic and integral part of IT. Respectively, increased the importance of correct determination of entities to be protected and referred to as assets in the notation of ISO 27001. The paper considers several examples of non-existent (or imaginary) assets, which introduced the term "toxic asset". It is noted that it is necessary to create in Russia a national full-length, balanced and self-sustaining IT industry, which from the basis to the top layer of the add-in should be "riddled" with security features. Presents the rationale that learning to recognize the toxic assets in the field of it and cleaning them, the professionals can significantly improve the required level of IT-security.
- Text
- To obtain access to full text of journal and articles you must register!
- Buy