Abstract

The article considers the existing models of information security, which are the basis for the development of an individual protection profile, and determines the features of their applica-tion. Ensuring information security at the enterprise is to develop a comprehensive system for protecting information and controlling the sources of potential threats, the need to protect in-formation in accordance with existing standards for the security of information technology. Preparation and development of normative documentation of individual protection profile are necessary components in accordance with the type of activity and needs of the enterprise. The article substantiates the need to develop and further apply the company’s protection profile in accordance with modern standards in the field of information security. The number of profiles may not be limited, they are developed for various applications. The task of implementing the company's security policy includes the development of one or more security profiles. The secu-rity profile is the basis for creating a security task that can be considered as a technical project. The article considers the components of the concept of security and defines the connections and interactions between them. Identified requirements, risks (i.e. events or situations that indicate the possibility of harm), assets and measures affecting the vulnerability of the security profile. Safety trust requirements include technology development, testing, vulnerability analysis, sup-ply, maintenance, operational documentation, etc. Actions that pose potential threats to the se-curity of conditional ingestion have been identified. The article proposes the main components for building an individual profile of protection of a conventional enterprise, indicates the links between them. A description of the types of requirements in accordance with the hierarchy «class – family – component – element» was executed. The main classes of functional require-ments for individual protection profile are defined.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call