VGTU talpykla > Doktorantūros skyrius / Department for Doctoral Studies > Technologijos mokslų daktaro disertacijos ir jų santraukos >

Lietuvių   English
Please use this identifier to cite or link to this item:

Title: Automation of harmonization, analysis and evaluation of information security requirements
Other Titles: Informacijos saugos reikalavimų harmonizavimo, analizės ir įvertinimo automatizavimas
Authors: Olifer, Dmitrij
Issue Date: 22-Jul-2019
Publisher: VGTU leidykla „Technika“
Citation: Olifer, D. 2019. Automation of harmonization, analysis and evaluation of information security requirements: doctoral dissertation. Vilnius: Technika. 154 p.
Abstract: The growing use of Information Technology (IT) in daily operations of enterprises requires an ever-increasing level of protection over organization’s assets and information from unauthorised access, data leakage or any other type of information security breach. Because of that, it becomes vital to ensure the necessary level of protection. One of the best ways to achieve this goal is to implement controls defined in Information security documents. The problems faced by different organizations are related to the fact that often, organizations are required to be aligned with multiple Information security documents and their requirements. Currently, the organization’s assets and information protection are based on Information security specialist’s knowledge, skills and experience. Lack of automated tools for multiple Information security documents and their requirements harmonization, analysis and visualization lead to the situation when Information security is implemented by organizations in ineffective ways, causing controls duplication or increased cost of security implementation. An automated approach for Information security documents analysis, mapping and visualization would contribute to solving this issue. The dissertation consists of an introduction, three main chapters and general conclusions. The first chapter introduces existing Information security regulatory documents, current harmonization techniques, information security implementation cost evaluation methods and ways to analyse Information security requirements by applying graph theory optimisation algorithms (Vertex cover and Graph isomorphism). The second chapter proposes ways to evaluate information security implementation and costs through a controls-based approach. The effectiveness of this method could be improved by implementing automated initial data gathering from Business processes diagrams. In the third chapter, adaptive mapping on the basis of Security ontology is introduced for harmonization of different security documents; such an approach also allows to apply visualization techniques for harmonization results presentation. Graph optimization algorithms (vertex cover algorithm and graph isomorphism algorithm) for Minimum Security Baseline identification and verification of achieved results against controls implemented in small and medium-sized enterprises were proposed. It was concluded that the proposed methods provide sufficient data for adjustment and verification of security controls applicable by multiple Information security documents.
Description: Dissertation
ISBN: 978-609-476-184-3
Appears in Collections:Technologijos mokslų daktaro disertacijos ir jų santraukos

Files in This Item:

File Description SizeFormat
Annex C.pdfAnnex29.62 kBAdobe PDFView/Open
Annex B.pdfAnnex37.98 kBAdobe PDFView/Open
Annex A.pdfAnnex318.23 kBAdobe PDFView/Open
Olifer disertacija.pdfDisertacija5.43 MBAdobe PDFView/Open

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.


Valid XHTML 1.0! DSpace Software Copyright © 2002-2010  Duraspace - Feedback