Abstract

Purpose of the study. Creating an effective information security system of an enterprise is impossible without an adequate assessment of the risks to which its assets are exposed. The results of such an assessment should become the basis for making decisions in the field of information security of the enterprise. Identification of information assets and assessment of their value, determination of the level of threats to the security of assets allow planning measures to create an enterprise information security system.This paper discusses a methodology for assessing the risks of information security of an enterprise, a distinctive feature and novelty of which is the use of modern tools and methods for constructing and analyzing business processes in order to identify the information assets of an enterprise to be protected.Materials and methods. It is proposed to identify information assets based on the model of business processes of the enterprise, performed using the IDEF0 methodology. Modeling of business processes was carried out in the Business Studio environment of the “Modern Management Technologies” company.The activity of a typical IT-industry company was considered as an example for the risk analysis.Results. The methodology for assessing the risks of information security of an enterprise described in the article has been successfully tested in the educational process. Its use in conducting laboratory classes in the discipline “Designing the information security system of enterprises and organizations” for masters studying in the direction of “Information security” allowed, according to the authors of the article, to increase the effectiveness of the formation of students’ professional competencies.Conclusion. The paper proposes a methodology for assessing information security risks for objects of an enterprise’s information infrastructure, which makes it possible to identify priority areas of information security at an enterprise. As a result of the application of the technique, a loss matrix is formed, showing the problem areas in the organization of information protection, which should be given priority attention when planning information security measures. Based on the data obtained, it is possible to form an economically justified strategy and tactics for the development of an enterprise information security system.

Highlights

  • This paper discusses a methodology for assessing the risks of information security of an enterprise, a distinctive feature and novelty of which is the use of modern tools and methods for constructing and analyzing business processes in order to identify the information assets of an enterprise to be protected

  • The methodology for assessing the risks of information security of an enterprise described in the article has been successfully tested in the educational process

  • Its use in conducting laboratory classes in the discipline “Designing the information security system of enterprises and organizations” for masters studying in the direction of “Information security” allowed, according to the authors of the article, to increase the effectiveness of the formation of students’ professional competencies

Read more

Summary

Results

The methodology for assessing the risks of information security of an enterprise described in the article has been successfully tested in the educational process. Ключевым фактором построения эффективной системы информационной безопасности предприятия является идентификация подлежащих защите информационных активов предприятия. Идентификация информационных активов и оценка их стоимости, определение уровня угроз безопасности активов позволяет спланировать мероприятия по созданию системы информационной безопасности предприятия. Существующие подходы к вопросу формирования реестра подлежащих защите активов предприятия не предполагают использования для решения данной задачи современных методов и программных средств построения и анализа бизнес-процессов предприятия. В настоящей работе рассматривается методика оценки рисков информационной безопасности предприятия, отличительной особенностью и новизной которой является применение современных средств и методов построения и анализа бизнес-процессов с целью определения подлежащих защите информационных активов предприятия. Для выявления подлежащих защите информационных активов предприятия производится построение функциональной модели бизнес-процессов с использованием методики IDEF0 [10]. Моделирование бизнес-процессов выполняется в среде Business Studio компании «Современные технологии управления» [11]

Обзор методик оценки рисков информационной безопасности предприятия
Задачи на выполнение работ по аутсорсингу
Сведения по заявкам на программно-техническое обслуживание
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call