ADVANCED METHODS OF ANALYSIS OF INFORMATION FLOWS IN THE SPHERE OF SECURITY OF THE AUTOMATED SYSTEMS OF EMERCOM OF RUSSIA (INFORMATION-ANALYTICAL REVIEW - PART 1)
Abstract and keywords
Abstract (English):
In the article the expedience of the use of new approaches to information security of the automated systems of EMERCOM of Russia. Researched the possibilities of application of the promising methods for processing data about destructive information influences on these systems and counteract them.

Keywords:
systemic approach, big data analytics, behavioral analysis, expert analysis of the network activity, cognitive intelligence
References

1. Fabiano Vallesi. Cifrovaya ataka. URL: http://pbwm.ru/articles/ tsifrovaya-ataka (data obrascheniya: 23.11.2015).

2. Jon Oltsik, Analytics-based approach to cyber security. May, 2015. URL: https://www. splunk.com/content/dam/splunk2/pdfs/white-papers/esg-solution-showcase-splunk-may-2015.pdf. (data obrascheniya: 23.11.2015).

3. Reuters: Rossiyskie hakery pohitili lichnye dannye 272 mln. pol'zovateley. URL: https://aftershock.news/?q=node/395028. (data obrascheniya: 04.05.2016).

4. Research: Thwarting sophisticated cyberattacks demand better grasp of big data with more proactive analytics. SAS Global Forum, Dallas, Apr. 27. 2015.

5. Sberbank ocenil poteri ekonomiki ot kiberatak v 600 milliardov rubley. URL: https://lenta.ru/news/2016/06/10/cyberattack/.(data obrascheniya: 10.06.2016).

6. McAfee. An Intel Company. Ekonomicheskie posledstviya kiberprestupnosti i kibershpionazha. Centr strategicheskih i mezhdunarodnyh issledovaniy (CSIS): otchet. 2013.

7. Big Data and Predictive analytic: on the cyber security front line. IDC white paper, February, 2015, IDC #254290.

8. The Global Risks Report 2016 11th Edition. - World Economic Forum. URL: http://www3.weforum.org/docs/Media/TheGlobalRisksReport2016.pdf. (data obrascheniya: 10.06.2016).

9. Doktrina informacionnoy bezopasnosti Rossiyskoy Federacii: proekt. Sovet Bezopasnosti Ros. Federacii. URL: http://www.scrf.gov.ru/ documents/6/135.html. (data obrascheniya: 10.06.2016).

10. Kibervoyna tol'ko nabiraet oboroty - NATO vstupaet v igru. InfoResist. URL: https://inforesist.org/kibervoyna-tolko-nabiraet-oborotyi-nato-vstupaet-v-igru/ (data obrascheniya: 09.07.2016).

11. SAS: Trends in combating cyber crime Tips and technology for defending your network. URL: http://www.risktech-forum.com/home/search?keywords=cybercrime. (data obrascheniya: 09.07.2016).

12. Eshbi U.R. Vvedenie v kibernetiku. M.: «Inostrannaya literatura», 1959.

13. The business model for information security. URL: https://www.isaca.org/ knowledge-center/bmis/documents/introtobmis.pdf. (data obrascheniya: 09.07.2016).

14. Cloud Security Alliance (CSA). Big data analytics for security intelligence. URL: https://downloads.cloudsecurityalliance.org/initiatives/bdwg/Big_Data_Analytics_for_Security_Intelligence.pdf. (data obrascheniya: 09.07.2016).

15. A Case Study In Security Big Data Analysis. 3/9/2012. URL: http://www.darkreading.com/monitoring/a-case-study-in-security-big-data-analys/232602339. (data obrascheniya: 09.07.2016).

16. Bill Franks. Taming the Big Data Tidal Wave. Finding opportunities in huge data Streams with advanced analytics. John Wiley & Sons, Inc. 2012. 304 p.

17. Big Data Now, Current Perspectives from O’Reilly Media, 2014 Edition.

Login or Create
* Forgot password?