ANTIVIRUS SOFTWARE AND INDUSTRIAL CYBER SECURITY SYSTEM CERTIFICATION IN RUSSIA
https://doi.org/10.32362/2500-316X-2019-7-1-48-56
Аннотация
Об авторах
M. A. NazarenkoРоссия
A. I. Gorobets
Россия
D. V. Miskov
Россия
V. V. Muravyev
Россия
A. S. Novikov
Россия
Список литературы
1. Kabali H.K., Rigoyen M.M., Nunez-Davis R., Budacki J.G., Mohanty S.H., Leister K.P., Bonner R.L. Jr. Exposure and use of mobile media devices by young children // Pediatrics. 2015. V. 136. № 6. P. 1044-1050. doi: 10.1542/peds.2015-2151
2. Schoitsch E., Schmittner C., Ma Z., Gruber Th. The need for safety and cyber-security co-engineering and standardization for highly automated automotive vehicles // In: Advanced Microsystems for Automotive Applications / Schulze T., Müller B., Meyer G. (eds). Springer, 2015. P. 251-261.
3. Ni J.Z., Melnyk S., Flynn B.B., Ritchie W. Why be first if it doesn’t pay? The case of early adopters of C-TPAT supply chain security certification // Int. J. Operat. & Product. Management. 2016. V. 36. №. 10. P. 1161-1181.
4. Gcaza N., Von Solms R. A A strategy for a cybersecurity culture: A South African perspective // The Electronic Journal of Information Systems in Developing Countries. 2017. V. 80. №. 1. P. 1-17.
5. Mourtzis D., Vlachou E. Cloud-based cyber-physical systems and quality of services // The TQM Journal. 2016. V. 28. № 5. P. 704-733.
6. Raisinghani M.S. Can total quality management exist in cyber security: Is it present? Are we safe? // In: Handbook of Research on Digital Crime, Cyberspace Security, and Information Assurance. IGI Global, 2015. P. 350-359.
7. Cherdantseva Y., Burnap P., Blyth A., Eden P., Jones K., Soulsby H., Stoddart K. A review of cyber security risk assessment methods for SCADA systems // Computers & Security. 2016. V. 56. P. 1-27.
8. Kent A.D. Cyber security data sources for dynamic network research // In: Dynamic Networks and Cyber-Security. Publisher WSPC, 2016. P. 37-65.
9. Ефремова М.А. Уголовно-правовое обеспечение кибербезопасности: некоторые проблемы и пути их решения // Право и кибербезопасность. 2014. № 2. С. 33-38.
10. Зиборов О.В., Иванов М.А., Чекунов И.Г. Состояние кибербезопасности современного информационного общества // Вопросы кибербезопасности. 2017. № 52(20). С. 15-18.
11. Карцхия А.А. Кибербезопасность и интеллектуальная собственность. Часть 1 / Вопросы кибербезопасности. 2014. № 1(2). С. 61-66.
12. Knowles W., Hutchison D., Prince D., Diss J.P. A survey of cyber security management in industrial control systems // Int. J. Critical Infrastructure Protection. 2015. V. 9. P. 52-80.
13. Gopalakrishnan S., Zhang H. The link between vendor certification and performance in IT outsourcing: A tale of two stories // Academy of Management Proceed. 2018. № 1. P. 129-167.
14. Kantardjieva M. The relationship between total quality management (TQM) and strategic management // J. Economics, Business and Management. 2015. V. 3. № 5. P. 537-541.
15. Shin J. , Son H., Rahman K.U., Heo G. Development of a cyber security risk model using Bayesian networks // Reliability Engineering & System Safety. 2015. V. 134. P. 208-217.
Дополнительные файлы
|
1. Fig. 1. IT product life cycle. | |
Тема | ||
Тип | Research Instrument | |
Посмотреть
(78KB)
|
Метаданные ▾ |
Рецензия
Для цитирования:
Nazarenko M.A., Gorobets A.I., Miskov D.V., Muravyev V.V., Novikov A.S. ANTIVIRUS SOFTWARE AND INDUSTRIAL CYBER SECURITY SYSTEM CERTIFICATION IN RUSSIA. Russian Technological Journal. 2019;7(1):48-56. https://doi.org/10.32362/2500-316X-2019-7-1-48-56
For citation:
Nazarenko M.A., Gorobets A.I., Miskov D.V., Muravyev V.V., Novikov A.S. ANTIVIRUS SOFTWARE AND INDUSTRIAL CYBER SECURITY SYSTEM CERTIFICATION IN RUSSIA. Russian Technological Journal. 2019;7(1):48-56. https://doi.org/10.32362/2500-316X-2019-7-1-48-56