Development and implementation a platform to secure cyber infrastructure and operation
- 1 Ministry of information society and administration, Skopie, Republic of Macedonia
Abstract
Cyber security is a comprehensive area that covers the protection of assets from cyber crime which affect operations in organizations and is achieved through active monitoring, detection of interruptions or malicious activity and timely response to interference. Geo-spatial approach to cyber-security and technology development provides clear guidance and vision for contemporary data protection in the organization. The role of Geo-spatial technologies in support of physical security is well-known and intelligible and is used for situational information, multi-INT, synthesis, analysis and information exchange. Development of platforms enables organizations to implement these cyber defense concepts to quickly identify and prioritize cyber threats by creating a technical solution that integrates all existing data to reduce uncertainty
Keywords
References
- Charles, K. (2013). The C.I.A. triad or C.I.A. triangle and other security concepts. http://www.securityorb.com/2013/10/c-i-atriangle-security-concepts
- Deutsch, W. (2014). 6 security policies you need: an introduction to creating effective security policies. http://bizsecurity.about.com/od/creatingpolicies/a/6_policies.htm
- ForeScout. (2014). Mobile security https://www.forescout.com/solutions/mobile-security/
- Garret, C. (2012). Importance of a security policy. http://www.slideshare.net/charlesgarrett/importance-of-a-securitypolicy-11380022
- Information Security Handbook. (2009). What is Information Security?. http://ishandbook.bsewall.com/risk/Methodology/IS.html
- Johnson, M. E. & Goetz, E. (2007). Managing Organizational Security: Embedding Information Security into the Organization. IEEE Security & Privacy, 2, 16-24. https://www.computer.org /security/
- Mellado, D. & Rosado, D. G. (2012). An Overview of Current Information Systems Security Challenges and Innovations. Journal of Universal Computer Science, 18, 1598-1607. http://www.jucs.org/jucs_18_12/an_overview_of_current/jucs_18_12_1598_1607_editorial.pdf
- MindfulSecurity.com. (2014). Why is Information Security Important? http://mindfulsecurity.com/2009/07/01/why-isinformation-security-important/
- OpenLearn. (2014). an introduction to information security. http://www.open.edu/openlearn/science-mathstechnology/computing-and-ict/introduction-informationsecurity/content-section-3
- Rossouw von Solms. (1998). Information security management (1): why information security is so important. Information Management & Computer Security, 6, 174-177. http://www.emeraldinsight.com.ezaccess.library.uitm.edu.my/journals.htm?issn=09685227&volume=6&issue=4&articleid=862722&show=pdf
- Schneider, L. (2014). Information security: learn about information security. http://jobsearchtech.about.com/od/historyoftechindustry/g/InfoSecurity.
- Slade, E. (2009). Top 3 Reasons Why Information Security & IT Maintenance is Important. http://www.howardcounty.com/Top_3_Reasons_Why_Information_Security__IT_Maintenance_is_Important-a-1224.html