Preview

The Herald of the Siberian State University of Telecommunications and Information Science

Advanced search

An overview of regulatory sources and practices of information security incidents management

https://doi.org/10.55648/1998-6920-2021-15-1-50-59

Abstract

Any organization should take into account the threats to information assets to ensure information environment security. It is impossible to identify an entire field of all possible threats for each specific business: appearance of new threats may be caused by changes in the internal or external working conditions of an organization as well as the development of new technologies and other changes. Using time-tested standards and best international practices is highly recommended for managing incidents.

About the Author

A. .. Loginova
МГЛУ
Russian Federation


References

1. Корнеев И. Р. Система управления непрерывностью бизнеса: Почему она должна быть внедрена на каждом предприятии? М.: ЛЕНАНД, 2016. 352 с.

2. Рыженкова А. Управление инцидентами информационной безопасности: о чем говорят стандарты // CONNECT. На пути к полнофункциональному SOC. 2014. № 7-8. С. 62-65.

3. Sunil Ladekar. Best Practices for Information Security Breach Management. East Carolina University, College of Technology and Computer Science, Department of Technology Systems. 2014.

4. ISO/IEC 27035:2016. Information technology - Security techniques - Information security incident management. ISO/IEC, 2016.

5. NIST SP 800-61. Computer Incident Handling Guide. Gaithersburg: NIST, 2012.

6. NIST SP 800-83. Guide to Malware Incident Prevention and Handling. Gaithersburg: NIST, 2013.

7. NIST SP 800-86. Integrating Forensic Techniques into Incident Response. Gaithersburg: NIST, 2006.

8. CMU/SEI-2004-TR-015. Defining incident management processes for Critical Insident Stress Response Team. CMU/SEI, 2004.

9. ISO/IEC 27001:2005. Information security management systems - Requirements. ISO/IEC, 2005.

10. ISO/IEC 27002:2005. Information technology - Security techniques - Code of practice for Information security management. ISO/IEC, 2005.

11. ISO/IEC 27031:2011 Information technology - Security techniques - Guidelines for information and communication technology readiness for business continuity. ISO/IEC, 2011.

12. ISO/IEC 27005:2018. Information technology - Security techniques - Information security risk management. ISO/IEC, 2018.

13. ISO/IEC 27001:2013. Information security management systems - Requirements. ISO/IEC, 2013.

14. Царегородцев А. В. Критичные вопросы оперативного и организационно-технического управления информационной безопасностью облачных вычислений // Национальная безопасность. Nota bene. 2011. № 6 (17). С. 11-17.

15. ISO/IEC 27002:2013. Information technology - Security techniques - Code of practice for Information security management. ISO/IEC, 2013.

16. BS 7799-1:1995. Code of Practice for Information Security Management. London: British Standards Institution, 1995.

17. ISO/IEC 17799:2005. Information technology - Code of practice for information security management. ISO/IEC, 2005.

18. BS 7799-2:1999. Information security management, Specification for information security management systems. London: British Standards Institution, 1999.

19. BS 7799-3. Information security management systems. Guidelines for information security risk management. London: British Standards Institution.

20. ISO/IEC 27005:2008. Information technology - Security techniques - Information security risk management. ISO/IEC, 2008.

21. MEHARI. CLISIF, 2016.

22. ISO/IEC 20000:2011. Information technology - Service management. ISO/IEC, 2011.

23. ISO/IEC 20000:2018. Information technology - Service management. ISO/IEC, 2018.

24. COBIT 5. ISACA, 2012.

25. Об информации, информационных технологиях и о защите информации: Федеральный закон от 27 июля 2006 г. №149-ФЗ.

26. О персональных данных: Федеральный закон от 27 июля 2006 г. №152-ФЗ.

27. Рекомендации в области стандартизации Банка России «Обеспечение информационной безопасности организаций банковской системы Российской Федерации. Менеджмент инцидентов информационной безопасности»: РС БР ИББС-2.5-2014. Банк России, 2014.

28. ГОСТ ИСО/МЭК 18044-2007. Информационная технология - Методы и средства обеспечения безопасности - Менеджмент инцидентов информационной безопасности. М.: Стандартинформ, 2009.

29. PCI DSS v 3.2:2016. PCI Security Standards Council, 2016.

30. Мещеряков Р. В., Исхаков С. Ю. О проблемах анализа данных в системах управления инцидентами безопасности роботов // Труды 8-й Всероссийской научной конференции с международным участием «Информационные технологии и системы», Ханты-Мансийск, 2020. С. 108-114.


Review

For citations:


Loginova A... An overview of regulatory sources and practices of information security incidents management. The Herald of the Siberian State University of Telecommunications and Information Science. 2021;(1):50-59. (In Russ.) https://doi.org/10.55648/1998-6920-2021-15-1-50-59

Views: 279


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 1998-6920 (Print)