4 research outputs found
Informacijos saugos reikalavimΕ³ harmonizavimo, analizΔs ir Δ―vertinimo automatizavimas
The growing use of Information Technology (IT) in daily operations of enterprises requires an ever-increasing level of protection over organizationβs assets and information from unauthorised access, data leakage or any other type of information security breach. Because of that, it becomes vital to ensure the necessary level of protection. One of the best ways to achieve this goal is to implement controls defined in Information security documents. The problems faced by different organizations are related to the fact that often, organizations are required to be aligned with multiple Information security documents and their requirements. Currently, the organizationβs assets and information protection are based on Information security specialistβs knowledge, skills and experience. Lack of automated tools for multiple Information security documents and their requirements harmonization, analysis and visualization lead to the situation when Information security is implemented by organizations in ineffective ways, causing controls duplication or increased cost of security implementation. An automated approach for Information security documents analysis, mapping and visualization would contribute to solving this issue. The dissertation consists of an introduction, three main chapters and general conclusions. The first chapter introduces existing Information security regulatory documents, current harmonization techniques, information security implementation cost evaluation methods and ways to analyse Information security requirements by applying graph theory optimisation algorithms (Vertex cover and Graph isomorphism). The second chapter proposes ways to evaluate information security implementation and costs through a controls-based approach. The effectiveness of this method could be improved by implementing automated initial data gathering from Business processes diagrams. In the third chapter, adaptive mapping on the basis of Security ontology is introduced for harmonization of different security documents; such an approach also allows to apply visualization techniques for harmonization results presentation. Graph optimization algorithms (vertex cover algorithm and graph isomorphism algorithm) for Minimum Security Baseline identification and verification of achieved results against controls implemented in small and medium-sized enterprises were proposed. It was concluded that the proposed methods provide sufficient data for adjustment and verification of security controls applicable by multiple Information security documents.Dissertatio
National Security & Innovation Activities: Methodology, Policy and Practice
ΠΠΎΠ½ΠΎΠ³ΡΠ°ΡΡΡ ΠΏΡΠΈΡΠ²ΡΡΠ΅Π½Π° Π΄ΠΎΡΠ»ΡΠ΄ΠΆΠ΅Π½Π½Ρ ΡΠ΅ΠΎΡΠ΅ΡΠΈΡΠ½ΠΈΡ
ΡΠ° ΠΏΡΠ°ΠΊΡΠΈΡΠ½ΠΈΡ
Π°ΡΠΏΠ΅ΠΊΡΡΠ² ΡΠ½Π½ΠΎΠ²Π°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ. Π ΠΎΠ·Π³Π»ΡΠ½ΡΡΠΎ ΡΡΠ·Π½Ρ ΡΠ½Π½ΠΎΠ²Π°ΡΡΠΉΠ½Ρ ΠΌΠ΅ΡΠΎΠ΄ΠΈΡΠ½Ρ ΠΏΡΠ΄Ρ
ΠΎΠ΄ΠΈ ΡΠ° Π΅ΠΊΠΎΠ½ΠΎΠΌΡΡΠ½Ρ ΠΌΠ΅Ρ
Π°Π½ΡΠ·ΠΌΠΈ Π·Π°Π±Π΅Π·ΠΏΠ΅ΡΠ΅Π½Π½Ρ ΡΠ½Π½ΠΎΠ²Π°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ Π½Π° ΡΠ΅Π³ΡΠΎΠ½Π°Π»ΡΠ½ΠΎΠΌΡ, Π½Π°ΡΡΠΎΠ½Π°Π»ΡΠ½ΠΎΠΌΡ ΡΠ° ΠΌΡΠΆΠ½Π°ΡΠΎΠ΄Π½ΠΎΠΌΡ ΡΡΠ²Π½ΡΡ
. ΠΠ°Π²Π΅Π΄Π΅Π½ΠΎ Π½Π°ΡΠΊΠΎΠ²ΠΎ ΠΎΠ±Π³ΡΡΠ½ΡΠΎΠ²Π°Π½Ρ ΡΠ΅ΠΊΠΎΠΌΠ΅Π½Π΄Π°ΡΡΡ ΡΠΎΠ΄ΠΎ Π΄ΠΎΡΡΠ³Π½Π΅Π½Π½Ρ Π΅ΠΊΠΎΠ½ΠΎΠΌΡΡΠ½ΠΈΡ
, ΡΡΠ½Π°Π½ΡΠΎΠ²ΠΈΡ
, ΡΠΎΡΡΠ°Π»ΡΠ½ΠΈΡ
ΡΠ° Π΅ΠΊΠΎΠ»ΠΎΠ³ΡΡΠ½ΠΈΡ
ΡΡΠ»Π΅ΠΉ Π½Π°ΡΡΠΎΠ½Π°Π»ΡΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ ΡΠ»ΡΡ
ΠΎΠΌ Π·ΠΌΡΡΠ½Π΅Π½Π½Ρ ΡΠ½Π½ΠΎΠ²Π°ΡΡΠΉΠ½ΠΎΡ ΡΠΈΡΡΠ΅ΠΌΠΈ.ΠΠΎΠ½ΠΎΠ³ΡΠ°ΡΠΈΡ ΠΏΠΎΡΠ²ΡΡΠ΅Π½Π° ΠΈΡΡΠ»Π΅Π΄ΠΎΠ²Π°Π½ΠΈΡ ΡΠ΅ΠΎΡΠ΅ΡΠΈΡΠ΅ΡΠΊΠΈΡ
ΠΈ ΠΏΡΠ°ΠΊΡΠΈΡΠ΅ΡΠΊΠΈΡ
Π°ΡΠΏΠ΅ΠΊΡΠΎΠ² ΠΈΠ½Π½ΠΎΠ²Π°ΡΠΈΠΎΠ½Π½ΠΎΠΉ Π±Π΅Π·ΠΎΠΏΠ°ΡΠ½ΠΎΡΡΠΈ. Π Π°ΡΡΠΌΠΎΡΡΠ΅Π½Ρ ΡΠ°Π·Π»ΠΈΡΠ½ΡΠ΅ ΠΈΠ½Π½ΠΎΠ²Π°ΡΠΈΠΎΠ½Π½ΡΠ΅ ΠΌΠ΅ΡΠΎΠ΄ΠΈΡΠ΅ΡΠΊΠΈΠ΅ ΠΏΠΎΠ΄Ρ
ΠΎΠ΄Ρ ΠΈ ΡΠΊΠΎΠ½ΠΎΠΌΠΈΡΠ΅ΡΠΊΠΈΠ΅ ΠΌΠ΅Ρ
Π°Π½ΠΈΠ·ΠΌΡ ΠΎΠ±Π΅ΡΠΏΠ΅ΡΠ΅Π½ΠΈΡ ΠΈΠ½Π½ΠΎΠ²Π°ΡΠΈΠΎΠ½Π½ΠΎΠΉ Π±Π΅Π·ΠΎΠΏΠ°ΡΠ½ΠΎΡΡΠΈ Π½Π° ΡΠ΅Π³ΠΈΠΎΠ½Π°Π»ΡΠ½ΠΎΠΌ, Π½Π°ΡΠΈΠΎΠ½Π°Π»ΡΠ½ΠΎΠΌ ΠΈ ΠΌΠ΅ΠΆΠ΄ΡΠ½Π°ΡΠΎΠ΄Π½ΠΎΠΌ ΡΡΠΎΠ²Π½ΡΡ
. ΠΠ°Π½Ρ Π½Π°ΡΡΠ½ΠΎ ΠΎΠ±ΠΎΡΠ½ΠΎΠ²Π°Π½Π½ΡΠ΅ ΡΠ΅ΠΊΠΎΠΌΠ΅Π½Π΄Π°ΡΠΈΠΈ ΠΏΠΎ Π΄ΠΎΡΡΠΈΠΆΠ΅Π½ΠΈΡ ΡΠΊΠΎΠ½ΠΎΠΌΠΈΡΠ΅ΡΠΊΠΈΡ
, ΡΠΈΠ½Π°Π½ΡΠΎΠ²ΡΡ
, ΡΠΎΡΠΈΠ°Π»ΡΠ½ΡΡ
ΠΈ ΡΠΊΠΎΠ»ΠΎΠ³ΠΈΡΠ΅ΡΠΊΠΈΡ
ΡΠ΅Π»Π΅ΠΉ Π½Π°ΡΠΈΠΎΠ½Π°Π»ΡΠ½ΠΎΠΉ Π±Π΅Π·ΠΎΠΏΠ°ΡΠ½ΠΎΡΡΠΈ ΠΏΠΎΡΡΠ΅Π΄ΡΡΠ²ΠΎΠΌ ΡΠΊΡΠ΅ΠΏΠ»Π΅Π½ΠΈΡ ΠΈΠ½Π½ΠΎΠ²Π°ΡΠΈΠΎΠ½Π½ΠΎΠΉ ΡΠΈΡΡΠ΅ΠΌΡ.Monograph is devoted to the research of theoretical and practical aspects of the innovation security. Different innovative methodic approaches and economic mechanisms to provide innovation security at the regional, national and international levels are considered. Scientifically grounded recommendations to achieve economic, financial, social and ecological aims of the national security through the strengthening of innovation system are given.Sponsors of the monograph are Prokopenko Olha, Shkola Viktoriia, Domashenko Maryna, Omelyanenko Vitaliy and Shcherbachenko Viktoriia, who in 2017 have worked within the Grant of President of Ukraine, granted for research project βThe development of the mechanisms for management of an innovative subcomponent of Ukrainian economic securityβ, under the leadership of Prokopenko Olha, and they also have decided to invest their salary in the further researches. Π‘ΠΏΠΎΠ½ΡΠΎΡΠ°ΠΌΠΈ ΠΌΠΎΠ½ΠΎΠ³ΡΠ°ΡΡΡ Ρ ΠΡΠΎΠΊΠΎΠΏΠ΅Π½ΠΊΠΎ ΠΠ»ΡΠ³Π°, Π¨ΠΊΠΎΠ»Π° ΠΡΠΊΡΠΎΡΡΡ, ΠΠΎΠΌΠ°ΡΠ΅Π½ΠΊΠΎ ΠΠ°ΡΠΈΠ½Π°, ΠΠΌΠ΅Π»ΡΡΠ½Π΅Π½ΠΊΠΎ ΠΡΡΠ°Π»ΡΠΉ ΡΠ° Π©Π΅ΡΠ±Π°ΡΠ΅Π½ΠΊΠΎ ΠΡΠΊΡΠΎΡΡΡ, ΡΠΊΡ Π² 2017 ΡΠΎΡΡ ΠΏΡΠ°ΡΡΠ²Π°Π»ΠΈ Π² ΡΠ°ΠΌΠΊΠ°Ρ
ΠΡΠ°Π½ΡΡ ΠΡΠ΅Π·ΠΈΠ΄Π΅Π½ΡΠ° Π£ΠΊΡΠ°ΡΠ½ΠΈ Π½Π°Π΄ Π΄ΠΎΡΠ»ΡΠ΄Π½ΠΈΡΡΠΊΠΈΠΌ ΠΏΡΠΎΠ΅ΠΊΡΠΎΠΌ "Π ΠΎΠ·ΡΠΎΠ±ΠΊΠ° ΠΌΠ΅Ρ
Π°Π½ΡΠ·ΠΌΡΠ² ΡΠΏΡΠ°Π²Π»ΡΠ½Π½Ρ ΡΠ½Π½ΠΎΠ²Π°ΡΡΠΉΠ½ΠΈΠΌ ΠΏΡΠ΄ΠΊΠΎΠΌΠΏΠΎΠ½Π΅Π½ΡΠΎΠΌ Π΅ΠΊΠΎΠ½ΠΎΠΌΡΡΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ Π£ΠΊΡΠ°ΡΠ½ΠΈ" ΠΏΡΠ΄ ΠΊΠ΅ΡΡΠ²Π½ΠΈΡΡΠ²ΠΎΠΌ ΠΡΠΎΠΊΠΎΠΏΠ΅Π½ΠΊΠΎ ΠΠ»ΡΠ³ΠΈ Ρ Π²ΠΈΡΡΡΠΈΠ»ΠΈ Π²ΠΊΠ»Π°ΡΡΠΈ ΡΠ²ΠΎΡ Π·Π°ΡΠΏΠ»Π°ΡΡ Π² ΠΏΠΎΠ΄Π°Π»ΡΡΡ Π΄ΠΎΡΠ»ΡΠ΄ΠΆΠ΅Π½Π½Ρ
National Security & Innovation Activities: Methodology, Policy and Practice
ΠΠΎΠ½ΠΎΠ³ΡΠ°ΡΡΡ ΠΏΡΠΈΡΠ²ΡΡΠ΅Π½Π° Π΄ΠΎΡΠ»ΡΠ΄ΠΆΠ΅Π½Π½Ρ ΡΠ΅ΠΎΡΠ΅ΡΠΈΡΠ½ΠΈΡ
ΡΠ° ΠΏΡΠ°ΠΊΡΠΈΡΠ½ΠΈΡ
Π°ΡΠΏΠ΅ΠΊΡΡΠ² ΡΠ½Π½ΠΎΠ²Π°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ. Π ΠΎΠ·Π³Π»ΡΠ½ΡΡΠΎ ΡΡΠ·Π½Ρ ΡΠ½Π½ΠΎΠ²Π°ΡΡΠΉΠ½Ρ ΠΌΠ΅ΡΠΎΠ΄ΠΈΡΠ½Ρ ΠΏΡΠ΄Ρ
ΠΎΠ΄ΠΈ ΡΠ° Π΅ΠΊΠΎΠ½ΠΎΠΌΡΡΠ½Ρ ΠΌΠ΅Ρ
Π°Π½ΡΠ·ΠΌΠΈ Π·Π°Π±Π΅Π·ΠΏΠ΅ΡΠ΅Π½Π½Ρ ΡΠ½Π½ΠΎΠ²Π°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ Π½Π° ΡΠ΅Π³ΡΠΎΠ½Π°Π»ΡΠ½ΠΎΠΌΡ, Π½Π°ΡΡΠΎΠ½Π°Π»ΡΠ½ΠΎΠΌΡ ΡΠ° ΠΌΡΠΆΠ½Π°ΡΠΎΠ΄Π½ΠΎΠΌΡ ΡΡΠ²Π½ΡΡ
. ΠΠ°Π²Π΅Π΄Π΅Π½ΠΎ Π½Π°ΡΠΊΠΎΠ²ΠΎ ΠΎΠ±Π³ΡΡΠ½ΡΠΎΠ²Π°Π½Ρ ΡΠ΅ΠΊΠΎΠΌΠ΅Π½Π΄Π°ΡΡΡ ΡΠΎΠ΄ΠΎ Π΄ΠΎΡΡΠ³Π½Π΅Π½Π½Ρ Π΅ΠΊΠΎΠ½ΠΎΠΌΡΡΠ½ΠΈΡ
, ΡΡΠ½Π°Π½ΡΠΎΠ²ΠΈΡ
, ΡΠΎΡΡΠ°Π»ΡΠ½ΠΈΡ
ΡΠ° Π΅ΠΊΠΎΠ»ΠΎΠ³ΡΡΠ½ΠΈΡ
ΡΡΠ»Π΅ΠΉ Π½Π°ΡΡΠΎΠ½Π°Π»ΡΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ ΡΠ»ΡΡ
ΠΎΠΌ Π·ΠΌΡΡΠ½Π΅Π½Π½Ρ ΡΠ½Π½ΠΎΠ²Π°ΡΡΠΉΠ½ΠΎΡ ΡΠΈΡΡΠ΅ΠΌΠΈ.ΠΠΎΠ½ΠΎΠ³ΡΠ°ΡΠΈΡ ΠΏΠΎΡΠ²ΡΡΠ΅Π½Π° ΠΈΡΡΠ»Π΅Π΄ΠΎΠ²Π°Π½ΠΈΡ ΡΠ΅ΠΎΡΠ΅ΡΠΈΡΠ΅ΡΠΊΠΈΡ
ΠΈ ΠΏΡΠ°ΠΊΡΠΈΡΠ΅ΡΠΊΠΈΡ
Π°ΡΠΏΠ΅ΠΊΡΠΎΠ² ΠΈΠ½Π½ΠΎΠ²Π°ΡΠΈΠΎΠ½Π½ΠΎΠΉ Π±Π΅Π·ΠΎΠΏΠ°ΡΠ½ΠΎΡΡΠΈ. Π Π°ΡΡΠΌΠΎΡΡΠ΅Π½Ρ ΡΠ°Π·Π»ΠΈΡΠ½ΡΠ΅ ΠΈΠ½Π½ΠΎΠ²Π°ΡΠΈΠΎΠ½Π½ΡΠ΅ ΠΌΠ΅ΡΠΎΠ΄ΠΈΡΠ΅ΡΠΊΠΈΠ΅ ΠΏΠΎΠ΄Ρ
ΠΎΠ΄Ρ ΠΈ ΡΠΊΠΎΠ½ΠΎΠΌΠΈΡΠ΅ΡΠΊΠΈΠ΅ ΠΌΠ΅Ρ
Π°Π½ΠΈΠ·ΠΌΡ ΠΎΠ±Π΅ΡΠΏΠ΅ΡΠ΅Π½ΠΈΡ ΠΈΠ½Π½ΠΎΠ²Π°ΡΠΈΠΎΠ½Π½ΠΎΠΉ Π±Π΅Π·ΠΎΠΏΠ°ΡΠ½ΠΎΡΡΠΈ Π½Π° ΡΠ΅Π³ΠΈΠΎΠ½Π°Π»ΡΠ½ΠΎΠΌ, Π½Π°ΡΠΈΠΎΠ½Π°Π»ΡΠ½ΠΎΠΌ ΠΈ ΠΌΠ΅ΠΆΠ΄ΡΠ½Π°ΡΠΎΠ΄Π½ΠΎΠΌ ΡΡΠΎΠ²Π½ΡΡ
. ΠΠ°Π½Ρ Π½Π°ΡΡΠ½ΠΎ ΠΎΠ±ΠΎΡΠ½ΠΎΠ²Π°Π½Π½ΡΠ΅ ΡΠ΅ΠΊΠΎΠΌΠ΅Π½Π΄Π°ΡΠΈΠΈ ΠΏΠΎ Π΄ΠΎΡΡΠΈΠΆΠ΅Π½ΠΈΡ ΡΠΊΠΎΠ½ΠΎΠΌΠΈΡΠ΅ΡΠΊΠΈΡ
, ΡΠΈΠ½Π°Π½ΡΠΎΠ²ΡΡ
, ΡΠΎΡΠΈΠ°Π»ΡΠ½ΡΡ
ΠΈ ΡΠΊΠΎΠ»ΠΎΠ³ΠΈΡΠ΅ΡΠΊΠΈΡ
ΡΠ΅Π»Π΅ΠΉ Π½Π°ΡΠΈΠΎΠ½Π°Π»ΡΠ½ΠΎΠΉ Π±Π΅Π·ΠΎΠΏΠ°ΡΠ½ΠΎΡΡΠΈ ΠΏΠΎΡΡΠ΅Π΄ΡΡΠ²ΠΎΠΌ ΡΠΊΡΠ΅ΠΏΠ»Π΅Π½ΠΈΡ ΠΈΠ½Π½ΠΎΠ²Π°ΡΠΈΠΎΠ½Π½ΠΎΠΉ ΡΠΈΡΡΠ΅ΠΌΡ.Monograph is devoted to the research of theoretical and practical aspects of the innovation security. Different innovative methodic approaches and economic mechanisms to provide innovation security at the regional, national and international levels are considered. Scientifically grounded recommendations to achieve economic, financial, social and ecological aims of the national security through the strengthening of innovation system are given.Sponsors of the monograph are Prokopenko Olha, Shkola Viktoriia, Domashenko Maryna, Omelyanenko Vitaliy and Shcherbachenko Viktoriia, who in 2017 have worked within the Grant of President of Ukraine, granted for research project βThe development of the mechanisms for management of an innovative subcomponent of Ukrainian economic securityβ, under the leadership of Prokopenko Olha, and they also have decided to invest their salary in the further researches. Π‘ΠΏΠΎΠ½ΡΠΎΡΠ°ΠΌΠΈ ΠΌΠΎΠ½ΠΎΠ³ΡΠ°ΡΡΡ Ρ ΠΡΠΎΠΊΠΎΠΏΠ΅Π½ΠΊΠΎ ΠΠ»ΡΠ³Π°, Π¨ΠΊΠΎΠ»Π° ΠΡΠΊΡΠΎΡΡΡ, ΠΠΎΠΌΠ°ΡΠ΅Π½ΠΊΠΎ ΠΠ°ΡΠΈΠ½Π°, ΠΠΌΠ΅Π»ΡΡΠ½Π΅Π½ΠΊΠΎ ΠΡΡΠ°Π»ΡΠΉ ΡΠ° Π©Π΅ΡΠ±Π°ΡΠ΅Π½ΠΊΠΎ ΠΡΠΊΡΠΎΡΡΡ, ΡΠΊΡ Π² 2017 ΡΠΎΡΡ ΠΏΡΠ°ΡΡΠ²Π°Π»ΠΈ Π² ΡΠ°ΠΌΠΊΠ°Ρ
ΠΡΠ°Π½ΡΡ ΠΡΠ΅Π·ΠΈΠ΄Π΅Π½ΡΠ° Π£ΠΊΡΠ°ΡΠ½ΠΈ Π½Π°Π΄ Π΄ΠΎΡΠ»ΡΠ΄Π½ΠΈΡΡΠΊΠΈΠΌ ΠΏΡΠΎΠ΅ΠΊΡΠΎΠΌ "Π ΠΎΠ·ΡΠΎΠ±ΠΊΠ° ΠΌΠ΅Ρ
Π°Π½ΡΠ·ΠΌΡΠ² ΡΠΏΡΠ°Π²Π»ΡΠ½Π½Ρ ΡΠ½Π½ΠΎΠ²Π°ΡΡΠΉΠ½ΠΈΠΌ ΠΏΡΠ΄ΠΊΠΎΠΌΠΏΠΎΠ½Π΅Π½ΡΠΎΠΌ Π΅ΠΊΠΎΠ½ΠΎΠΌΡΡΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ Π£ΠΊΡΠ°ΡΠ½ΠΈ" ΠΏΡΠ΄ ΠΊΠ΅ΡΡΠ²Π½ΠΈΡΡΠ²ΠΎΠΌ ΠΡΠΎΠΊΠΎΠΏΠ΅Π½ΠΊΠΎ ΠΠ»ΡΠ³ΠΈ Ρ Π²ΠΈΡΡΡΠΈΠ»ΠΈ Π²ΠΊΠ»Π°ΡΡΠΈ ΡΠ²ΠΎΡ Π·Π°ΡΠΏΠ»Π°ΡΡ Π² ΠΏΠΎΠ΄Π°Π»ΡΡΡ Π΄ΠΎΡΠ»ΡΠ΄ΠΆΠ΅Π½Π½Ρ