ANTIVIRUS SOFTWARE AND INDUSTRIAL CYBER SECURITY SYSTEM CERTIFICATION IN RUSSIA
https://doi.org/10.32362/2500-316X-2019-7-1-48-56
Abstract
About the Authors
M. A. NazarenkoRussian Federation
A. I. Gorobets
Russian Federation
D. V. Miskov
Russian Federation
V. V. Muravyev
Russian Federation
A. S. Novikov
Russian Federation
References
1. Kabali H.K., Rigoyen M.M., Nunez-Davis R., Budacki J.G., Mohanty S.H., Leister K.P., Bonner R.L. Jr. Exposure and use of mobile media devices by young children. Pediatrics. 2015; 136(6): 1044-1050. doi: 10.1542/peds.2015-2151.
2. Schoitsch E., Schmittner C., Ma Z., Gruber Th. The need for safety and cyber-security co-engineering and standardization for highly automated automotive vehicles. In: Advanced Microsystems for Automotive Applications. Schulze T., Müller B., Meyer G. (eds). Springer, 2015: 251-261.
3. Ni J.Z., Melnyk S., Flynn B.B., Ritchie W. Why be first if it doesn’t pay? The case of early adopters of C-TPAT supply chain security certification. Int. J. Operat. & Product. Management. 2016; 36(10): 1161-1181.
4. Gcaza N., Von Solms R. A strategy for a cybersecurity culture: A South African perspective. The Electronic Journal of Information Systems in Developing Countries. 2017; 80(1): 1-17.
5. Mourtzis D., Vlachou E. Cloud-based cyber-physical systems and quality of services. The TQM Journal. 2016; 28(5): 704-733.
6. Raisinghani M.S. Can total quality management exist in cyber security: Is it present? Are we safe? In: Handbook of Research on Digital Crime, Cyberspace Security, and Information Assurance. IGI Global, 2015: 350-359.
7. Cherdantseva Y., Burnap P., Blyth A., Eden P., Jones K., Soulsby H., Stoddart K. A review of cyber security risk assessment methods for SCADA systems. Computers & Security. 2016; 56: 1-27.
8. Kent A.D. Cyber security data sources for dynamic network research. In: Dynamic Networks and Cyber-Security. Publisher WSPC, 2016: 37-65.
9. Efremova M.A. Criminal-legal ensuring of cyber security: Problems and ways of their solution. Pravo i kiberbesopasnost’ (Law and Cyber Security). 2014; 2: 33-38. (in Russ.)
10. Ziborov O.V., Ivanov M.A., Chekunov I.G. The state of cyber security in modern information society. Voprosi kiberbesopasnosti (Questions of Cyber Security). 2017; 52(20): 15-18. (in Russ.)
11. Kartskhiya A.A. Cyber security and intellectual property. Part 1. Voprosi kiberbesopasnosti (Questions of Cyber Security). 2014; 1(2): 61-66. (in Russ.)
12. Knowles W., Hutchison D., Prince D., Diss J.P. A survey of cyber security management in industrial control systems. Int. J. Critical Infrastructure Protection. 2015; 9: 52-80.
13. Gopalakrishnan S., Zhang H. The link between vendor certification and performance in IT outsourcing: A tale of two stories. Academy of Management Proceed. 2018; 1: 129-167.
14. Kantardjieva M. The relationship between total quality management (TQM) and strategic management. J. Economics, Business and Management. 2015; 3(5): 537-541.
15. Shin J. , Son H., Rahman K.U., Heo G. Development of a cyber security risk model using Bayesian networks. Reliability Engineering & System Safety. 2015; 134: 208-217.
Supplementary files
|
1. Fig. 1. IT product life cycle. | |
Subject | ||
Type | Research Instrument | |
View
(78KB)
|
Indexing metadata ▾ |
Review
For citations:
Nazarenko M.A., Gorobets A.I., Miskov D.V., Muravyev V.V., Novikov A.S. ANTIVIRUS SOFTWARE AND INDUSTRIAL CYBER SECURITY SYSTEM CERTIFICATION IN RUSSIA. Russian Technological Journal. 2019;7(1):48-56. https://doi.org/10.32362/2500-316X-2019-7-1-48-56