Adaptive Management of Processes of Protection of the Information from the Non-Authorized Access in Computing Systems.


Nikolay Eroslaev: Adaptive Management of Processes of Protection of the Information from the Non-Authorized Access in Computing Systems CSIT 1999 : E/E

Abstract

The initial basis for management of protection is served the plans of processing of the information in CS, and on the basis of the analysis to subject processing of the information the requirements to protection of the information are proved which can be expressed by a required parameter of security. The optimum decision of a difficult problem of a safety of the information now is possible only at the complex approach with use both organizational, and technical measures of protection. The stated above material can be used at the decision of a difficult task of a choice of the appropriate measures and means of protection at functioning CS.

Copyright © 1999 by the Institute for Contemporary Education "JurInfoR-MSU". Permission to copy without fee all or part of this material is granted provided that the copies are not made or distributed for direct commercial advantage, the CSIT copyright notice and the title of the publication and its date appear, and notice is given that copying is by permission of the Institute for Contemporary Education JMSUICE. To copy otherwise, or to republish, requires a fee and/or special permission from the JMSUICE.


Printed Edition

Ch. Freytag and V. Wolfengagen (Eds.): CSIT'99, Proceedings of 1st International Workshop on Computer Science and Information Technologies, January 18-22, 1999, Moscow, Russia. MEPhI Publishing 1999, ISBN 5-7262-0263-5

Electronic Edition