Calculation of risks of information security of telecommunication enterprise

The goal of this work is to identify and assess information security risks for a typical distributed information system within three controlled areas. The main emphasis, application of information security in the considered information system is done to minimize damage from security threats, aimed a...

Full description

Bibliographic Details
Main Authors: L. M. Il’chenko, E. K. Bragina, I. E. Egorov, S. I. Zaysev
Format: Article
Language:English
Published: Plekhanov Russian University of Economics 2018-01-01
Series:Otkrytoe Obrazovanie (Moskva)
Subjects:
Online Access:http://openedu.rea.ru/jour/article/view/486
id doaj-art-513f623e092546c19144b687b61a7993
recordtype oai_dc
spelling doaj-art-513f623e092546c19144b687b61a79932018-08-28T08:41:12ZengPlekhanov Russian University of EconomicsOtkrytoe Obrazovanie (Moskva)1818-42432079-59392018-01-01222617010.21686/1818-4243-2018-2-61-70400Calculation of risks of information security of telecommunication enterpriseL. M. Il’chenko0E. K. Bragina1I. E. Egorov2S. I. Zaysev3Saint-Petersburg National Research University of Information Technologies, Mechanics and OpticsSaint-Petersburg National Research University of Information Technologies, Mechanics and OpticsSaint-Petersburg National Research University of Information Technologies, Mechanics and OpticsAdmiral Makarov State University of Maritime and Inland ShippingThe goal of this work is to identify and assess information security risks for a typical distributed information system within three controlled areas. The main emphasis, application of information security in the considered information system is done to minimize damage from security threats, aimed at the integrity and availability of the hardware and software complex of the information system, and not to the confidentiality of information resources processed with their help. The study examined international and national standards in the field of information security, which regulate issues of information security risks management. In particular, the basic requirements for the assessment and processing of information security risks were established, based on the international standard “ISO 27001: 2013 Information technologies. Methods of protection. Information security management systems”, as well as a comparison of this standard with its version from 2005 is made. As a leading method of risk assessment and processing, the most economical the qualitative method was chosen, in the absence of ready data on the number of attacks implemented in the considered information system for a certain period of time. In the process, valuable assets of the organization were considered, and based on the business process of the telecommunication company, major and minor assets were allocated, as well as the corresponding information security threats in accordance with the security threat data bank of the Federal Service for Technical and Export Control. The result of this work was the calculation of information security risks, based on the allocation of valuable assets of the organization, the degree of potential damage in the implementation of threats to such assets and the probability of the implementation of threats to the information system of the telecommunication enterprise. In addition, acceptable risks were identified, the processing of which is not required due to the fact that the actual cost of minimizing them is greater than the losses from the implementation of threats over them. In conclusion, possible measures were proposed to minimize information security risks, including a backup system, a system for protecting against unauthorized access, an anti-virus protection system, firewalling, and organizational measures and physical protection measures. The proposed method makes it possible to reasonably assess information security risks of an organization in conditions of insufficient initial data, as well as the absence of additional hardware and software for assessing information security risks, which allows applying it to model organizations based only on scaling of the considered system, if there is no state information secret in the processed data. The risk management procedure helps not only to identify and eliminate the analysis of vulnerabilities and innovations in the field of risk assessment, but also to increase the literacy level of staff, involved in the assessment and risk management process.http://openedu.rea.ru/jour/article/view/486information securityinformation security risks’ managementtelecommunication enterprise
institution Open Data Bank
collection Open Access Journals
building Directory of Open Access Journals
language English
format Article
author L. M. Il’chenko
E. K. Bragina
I. E. Egorov
S. I. Zaysev
spellingShingle L. M. Il’chenko
E. K. Bragina
I. E. Egorov
S. I. Zaysev
Calculation of risks of information security of telecommunication enterprise
Otkrytoe Obrazovanie (Moskva)
information security
information security risks’ management
telecommunication enterprise
author_facet L. M. Il’chenko
E. K. Bragina
I. E. Egorov
S. I. Zaysev
author_sort L. M. Il’chenko
title Calculation of risks of information security of telecommunication enterprise
title_short Calculation of risks of information security of telecommunication enterprise
title_full Calculation of risks of information security of telecommunication enterprise
title_fullStr Calculation of risks of information security of telecommunication enterprise
title_full_unstemmed Calculation of risks of information security of telecommunication enterprise
title_sort calculation of risks of information security of telecommunication enterprise
publisher Plekhanov Russian University of Economics
series Otkrytoe Obrazovanie (Moskva)
issn 1818-4243
2079-5939
publishDate 2018-01-01
description The goal of this work is to identify and assess information security risks for a typical distributed information system within three controlled areas. The main emphasis, application of information security in the considered information system is done to minimize damage from security threats, aimed at the integrity and availability of the hardware and software complex of the information system, and not to the confidentiality of information resources processed with their help. The study examined international and national standards in the field of information security, which regulate issues of information security risks management. In particular, the basic requirements for the assessment and processing of information security risks were established, based on the international standard “ISO 27001: 2013 Information technologies. Methods of protection. Information security management systems”, as well as a comparison of this standard with its version from 2005 is made. As a leading method of risk assessment and processing, the most economical the qualitative method was chosen, in the absence of ready data on the number of attacks implemented in the considered information system for a certain period of time. In the process, valuable assets of the organization were considered, and based on the business process of the telecommunication company, major and minor assets were allocated, as well as the corresponding information security threats in accordance with the security threat data bank of the Federal Service for Technical and Export Control. The result of this work was the calculation of information security risks, based on the allocation of valuable assets of the organization, the degree of potential damage in the implementation of threats to such assets and the probability of the implementation of threats to the information system of the telecommunication enterprise. In addition, acceptable risks were identified, the processing of which is not required due to the fact that the actual cost of minimizing them is greater than the losses from the implementation of threats over them. In conclusion, possible measures were proposed to minimize information security risks, including a backup system, a system for protecting against unauthorized access, an anti-virus protection system, firewalling, and organizational measures and physical protection measures. The proposed method makes it possible to reasonably assess information security risks of an organization in conditions of insufficient initial data, as well as the absence of additional hardware and software for assessing information security risks, which allows applying it to model organizations based only on scaling of the considered system, if there is no state information secret in the processed data. The risk management procedure helps not only to identify and eliminate the analysis of vulnerabilities and innovations in the field of risk assessment, but also to increase the literacy level of staff, involved in the assessment and risk management process.
topic information security
information security risks’ management
telecommunication enterprise
url http://openedu.rea.ru/jour/article/view/486
_version_ 1612668257519534080