Usufull publications based on real experience
Study outlines the contours and the magnitude of the asymmetry in the opposition of cyber defense against hackers. Propose a model that reflects the dynamics of the opposition on both sides and the impact of the listed disproportions. It consist a functional analysis of the differences between organizational and technical approaches applied from both sides. Contains research into why even the most highly protected systems suffer from successful hacking attacks. The analysis sheds light on the magnitude of pressure exerted by malicious actors on cyber security for organizations and the disproportionate response from experts who protect information systems and networks.
The article offers a analysis of the scope of a conceptual model for a Shared Industrial Control Sys-tems (ICS) CyberSecurity Operations Center (SOC). The analysis of design of the conceptual
model is aimed at bridging the gaps in existing market solutions and meeting the needs of the entire cycle of cybersecurity engagements. It ensures continuous proportional ICS protection against
malicious actors and in accordance with regulations and standards. The focus of the research is on the three basic functions of cyber-security cycle – proactive functions, security operations management, and cybersecurity incident response. The aim of the study is to increase the effectiveness of cybersecurity for all Shared SOC subscribers, to overcome the problem of staff shortages, and allow
each company to focus on its core business. The applied methodology is based on the Fea-ture Driven Development approach, empirical experience from the implementation of cyber defense systems,
and interdisciplinary vision. The proposed analysis provides reference points for synthesizing a private solution for multiple clients of Shared SOC, a basis for concept of operations and preparation
for technical design. The idea of a Shared SOC provides a powerful tool for meeting the requirement for multi-layered cyber protection, which is already a fact in many regulatory measures. Shared SOC
creates conditions for all subscribers with ICS to increase their level of maturity in cybersecurity.
SECURITY DYNAMICS – ADAPTATION OF ICT INFRASTRUCTURE TO CLOUD
COMPUTING – THREADS AND OPPORTUNITIES
Abstract: The adoption of new technologies in organizations requires a preliminary assessment of risks, pro and cons of the planned change (SWOT analysis and change management). This paper acknowledges the important changes which are occurring in the security of the ICT systems in the organizations as a consequence from the transfer to the cloud services. Traditionally, IT is positioned behind the firewall of any organization and all servers, virtualized or not, are specific as a service for any business. The authority which supports the security systems could choose the components for security among multiple proved products – firewalls, antivirus systems, servers, updates management, proxy servers, etc. In this way is guaranteed the high level of control upon the security of IT environment and the requirements of different standards for security