Technical Framework Research on Critical Information Infrastructure Cybersecurity Classified Protection

被引:0
|
作者
Ren Weihong [1 ]
Yuan Jing [1 ]
Jiang Lei [1 ]
Zhao Tai [1 ]
机构
[1] Minist Publ Secur, Res Inst 3, Beijing, Peoples R China
来源
Proceedings of the 2016 4th International Conference on Machinery, Materials and Information Technology Applications | 2016年 / 71卷
关键词
Critical Infrastructure; Critical Information Infrastructure; Classified Protection; Management and control capability; Security control;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The technical framework of critical information infrastructure cybersecurity classified protection in this paper is established from the three levels of decision-making, managers and executives which ensures the information security technical framework of an organization is consistent with its strategic business objectives. At the same time, on the base of testing and evaluation for security classified protection, evaluation of management and control capability is conducive to evaluate the information security situation of an organization. The assessment of management and control capability combines the strategic business objectives and classified protection which is beneficial to promote organization's innovation and initiative.
引用
收藏
页码:1177 / 1181
页数:5
相关论文
共 50 条
  • [41] Methodology of Developing Laboratory Research Complexes on Critical Information Infrastructure Objects Security
    Shaburov, Andrey S.
    Alekseev, Vsevolod R.
    PROCEEDINGS OF THE 2021 IEEE CONFERENCE OF RUSSIAN YOUNG RESEARCHERS IN ELECTRICAL AND ELECTRONIC ENGINEERING (ELCONRUS), 2021, : 641 - 646
  • [42] Critical Infrastructure Protection-How to Assess the Protection Efficiency
    Bialas, Andrzej
    DEPENDABILITY ENGINEERING AND COMPLEX SYSTEMS, 2016, 470 : 25 - 37
  • [43] The Design Policy of Large Information System Security Protection Based on Classified Protection
    Qu, Jie
    Chen, Guangyong
    Ma, Li
    Li, Ming
    INDUSTRIAL INSTRUMENTATION AND CONTROL SYSTEMS, PTS 1-4, 2013, 241-244 : 2307 - +
  • [44] Managing Security of Critical Information Infrastructure
    Erokhin, S. D.
    2019 SYSTEMS OF SIGNAL SYNCHRONIZATION, GENERATING AND PROCESSING IN TELECOMMUNICATIONS (SYNCHROINFO), 2019,
  • [45] Critical Infrastructure Protection Systems Effectiveness Evaluation
    Lovecek, Tomas
    Ristvej, Jozef
    Simak, Ladislav
    JOURNAL OF HOMELAND SECURITY AND EMERGENCY MANAGEMENT, 2010, 7 (01)
  • [46] On Critical Infrastructure Protection in America and Inspiration to China
    Pei Yan
    PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON PUBLIC ADMINISTRATION (5TH), VOL III, 2009, : 61 - 67
  • [47] CRITICAL INFRASTRUCTURE PROTECTION IN HIGHER EDUCATION IN SLOVAKIA
    Luskova, Maria
    Leitner, Bohus
    INTED2017: 11TH INTERNATIONAL TECHNOLOGY, EDUCATION AND DEVELOPMENT CONFERENCE, 2017, : 1624 - 1629
  • [48] CRITICAL INFRASTRUCTURE RESILIENCE: RESILIENCE THINKING IN AUSTRALIA'S FEDERAL CRITICAL INFRASTRUCTURE PROTECTION POLICY
    O'Donnell, Kate
    SALUS JOURNAL, 2013, (03) : 13 - 32
  • [49] Information security governance practices in critical infrastructure organizations: A socio-technical and institutional logic perspective
    Susan P. Williams
    Catherine A. Hardy
    Janine A. Holgate
    Electronic Markets, 2013, 23 : 341 - 354
  • [50] Information security governance practices in critical infrastructure organizations: A socio-technical and institutional logic perspective
    Williams, Susan P.
    Hardy, Catherine A.
    Holgate, Janine A.
    ELECTRONIC MARKETS, 2013, 23 (04) : 341 - 354