Preview

Russian Technological Journal

Advanced search

ANTIVIRUS SOFTWARE AND INDUSTRIAL CYBER SECURITY SYSTEM CERTIFICATION IN RUSSIA

https://doi.org/10.32362/2500-316X-2019-7-1-48-56

Abstract

The article is dedicated to issues in certification of antivirus software and industrial cyber security systems. It was shown that certification time in Russia is much longer than in the USA, European Union and Germany. The life time and the development time of products of this field were analyzed in the article. Each variable was specified for new products and for new versions of existing products. Some statistical methods were used in the article: Cronbach’s alfa, t-statistics, and median value similarity that are typical for the articles in quality management. As a result, it was found that certification time in Russia for industrial cyber security systems is significantly longer than in other analyzed countries, up to three-fold. Product development and life time are also longer. However, the most important result is that certification in Russia adds from 32.1 to 40 percent of time to the development of a new version or a new product, correspondingly, whereas in other investigated countries these numbers are about 17 percent. Reduction of certification time will increase new product development efficiency in the field of cyber security, which will improve positions of Russian products at the international mark et.

About the Authors

M. A. Nazarenko
MIREA - Russian Technological University
Russian Federation


A. I. Gorobets
MIREA - Russian Technological University
Russian Federation


D. V. Miskov
MIREA - Russian Technological University
Russian Federation


V. V. Muravyev
MIREA - Russian Technological University
Russian Federation


A. S. Novikov
MIREA - Russian Technological University
Russian Federation


References

1. Kabali H.K., Rigoyen M.M., Nunez-Davis R., Budacki J.G., Mohanty S.H., Leister K.P., Bonner R.L. Jr. Exposure and use of mobile media devices by young children. Pediatrics. 2015; 136(6): 1044-1050. doi: 10.1542/peds.2015-2151.

2. Schoitsch E., Schmittner C., Ma Z., Gruber Th. The need for safety and cyber-security co-engineering and standardization for highly automated automotive vehicles. In: Advanced Microsystems for Automotive Applications. Schulze T., Müller B., Meyer G. (eds). Springer, 2015: 251-261.

3. Ni J.Z., Melnyk S., Flynn B.B., Ritchie W. Why be first if it doesn’t pay? The case of early adopters of C-TPAT supply chain security certification. Int. J. Operat. & Product. Management. 2016; 36(10): 1161-1181.

4. Gcaza N., Von Solms R. A strategy for a cybersecurity culture: A South African perspective. The Electronic Journal of Information Systems in Developing Countries. 2017; 80(1): 1-17.

5. Mourtzis D., Vlachou E. Cloud-based cyber-physical systems and quality of services. The TQM Journal. 2016; 28(5): 704-733.

6. Raisinghani M.S. Can total quality management exist in cyber security: Is it present? Are we safe? In: Handbook of Research on Digital Crime, Cyberspace Security, and Information Assurance. IGI Global, 2015: 350-359.

7. Cherdantseva Y., Burnap P., Blyth A., Eden P., Jones K., Soulsby H., Stoddart K. A review of cyber security risk assessment methods for SCADA systems. Computers & Security. 2016; 56: 1-27.

8. Kent A.D. Cyber security data sources for dynamic network research. In: Dynamic Networks and Cyber-Security. Publisher WSPC, 2016: 37-65.

9. Efremova M.A. Criminal-legal ensuring of cyber security: Problems and ways of their solution. Pravo i kiberbesopasnost’ (Law and Cyber Security). 2014; 2: 33-38. (in Russ.)

10. Ziborov O.V., Ivanov M.A., Chekunov I.G. The state of cyber security in modern information society. Voprosi kiberbesopasnosti (Questions of Cyber Security). 2017; 52(20): 15-18. (in Russ.)

11. Kartskhiya A.A. Cyber security and intellectual property. Part 1. Voprosi kiberbesopasnosti (Questions of Cyber Security). 2014; 1(2): 61-66. (in Russ.)

12. Knowles W., Hutchison D., Prince D., Diss J.P. A survey of cyber security management in industrial control systems. Int. J. Critical Infrastructure Protection. 2015; 9: 52-80.

13. Gopalakrishnan S., Zhang H. The link between vendor certification and performance in IT outsourcing: A tale of two stories. Academy of Management Proceed. 2018; 1: 129-167.

14. Kantardjieva M. The relationship between total quality management (TQM) and strategic management. J. Economics, Business and Management. 2015; 3(5): 537-541.

15. Shin J. , Son H., Rahman K.U., Heo G. Development of a cyber security risk model using Bayesian networks. Reliability Engineering & System Safety. 2015; 134: 208-217.


Supplementary files

1. Fig. 1. IT product life cycle.
Subject
Type Research Instrument
View (78KB)    
Indexing metadata ▾

Review

For citations:


Nazarenko M.A., Gorobets A.I., Miskov D.V., Muravyev V.V., Novikov A.S. ANTIVIRUS SOFTWARE AND INDUSTRIAL CYBER SECURITY SYSTEM CERTIFICATION IN RUSSIA. Russian Technological Journal. 2019;7(1):48-56. https://doi.org/10.32362/2500-316X-2019-7-1-48-56

Views: 1466


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 2782-3210 (Print)
ISSN 2500-316X (Online)