Figure 2 - uploaded by Zlatogor Minchev
Content may be subject to copyright.
A framework for architectural description of ISS. 

A framework for architectural description of ISS. 

Source publication
Conference Paper
Full-text available
In this paper, we present the data protection as one of the major components of every Information Security System (ISS). For this purpose, we outline the component-based architecture of ISS, the functions of its various components and the connections between them, as well as the different technologies, techniques and tools used in the ISS component...

Similar publications

Article
Full-text available
This study examines the impact of deterrence and inertia on information security policy changes. Corporations recognize the need to prioritize information security, which sometimes involves designing and implementing new security measures or policies. Using an online survey, we investigate the effect of deterrent sanctions and inertia on respondent...

Citations

Book
Full-text available
В настоящото изследване са разгледани основните особености и обхвата на съвременната система за електронен бизнес, използвана в организациите и стопанските субекти, в контекста на необходимостта от повишаване на дигиталните компетенции на потребителите на тази система. Направен е преглед на използваните средства, технологии и ресурси, оказващи пряко въздействие върху работата на потребителите с тях при осъществяването на различни бизнес процеси. Разгледани са дейности, инициирани или организирани от е-бизнес организации или стопански субекти, за създаване на условия за развитие на дигитални компетенции на потребителите, необходими за успешно и ефективно взаимодействие със системата за електронен бизнес на организациите и стопанските субекти. Чехларова, Н. (2023). Изследване на системата за е-бизнес в контекста на повишаване на дигиталната компетентност на потребителите. Тонедико. София. с. 170. ISBN 978-619-91492-8-7 Chehlarova, N. (2023). Research of the e-business system in the context of increasing the digital competences of consumers. Tonediko. Sofia. p. 170. ISBN 978-619-91492-8-7
Conference Paper
Full-text available
The basic step in the design of a security operations center (SOC) is identifying the necessary functions it needs to perform. The article offers an analysis of the ICS SOC functionalities and is focused to create a part of the concept of operations before the real design of Shared ICS SOC. We offer a complex of functionalities of Shared ICS SOC and analyze their effectiveness. The survey is based on a review of the legal framework, the ICS security incidents, research on the gaps between cybersecurity products and real needs for the ICS and SCADA community. Shared SOC performs role of community service hub with integrated experience, supplying security services for multiple ICS. By outsourcing these services, a company can reduce security staff and focus on its core business.