(2003) | Creating an IT security awareness program |
Areas of responsibility of participants in the process, preparation of the material, possible problems at the stage of program implementation, the control / audit process, examples | |
(2006) | Testing IT security plans |
Politics, areas of responsibility, methodology, examples of documents, particular methods: “desktop” test, simulations, testing in real situations | |
(2006) | Information Security Summary for Management |
The process of ensuring information security in organizations, the life cycle of IT systems, security of interaction between IT systems, training / raising awareness of employees in the field of information security, risk management in the field of information security, evaluation, certification, control, continuity and incident management | |
(2008) | Classification of information and information systems for security requirements methodology classifier |
The method of assignment and the classifier (recommended values) of the levels of the impact of breaches of confidentiality, integrity and availability depending on the type (purpose) of the processed information | |
(2008) | Technical issues of assessing the level of information security |
Evaluation methods, self-assessment, internal audit, external audit, pentest, process organization, assessment, analysis of results, use of results in the process of improving the organization's information security | |
(2009) | Password Management |
Existing threats when using password authentication, ensuring the storage of the password database, attacks of social engineering. | |
(2010) | IS Risk Management in Federal Information Systems |
Detailed methodology for managing the risks of information security, the roles and responsibilities of participants in the process, a description of related documents | |
(2010) | Planning for ensuring continuity in federal information systems |
Interrelation of various levels of ensuring continuity, assessment of the impact of various types of incidents on the service, choice of strategies, development and testing of plans, basic technologies for ensuring the continuity of information systems and services | |
(2011) | Information Security Monitoring in Federal Information Systems |
Possible levels of security monitoring: organization in general / business processes / IT systems, development of a monitoring strategy, definition of metrics, analysis of incoming data, use of results in the process of improving the organization's information security | |
(2012) | Information Security Incident Management |
Planning the process, creating a response team and its operation regulations, detecting incidents, prioritizing, choosing a response strategy, reducing damage, restoring systems, ensuring interaction between the executors in the incident response process | |
(2012) | Security Update Management |
Issues and problems in the update management process, technology to keep software up to date, process metrics |
Source: https://habr.com/ru/post/164371/
All Articles