Cybernetics and Systems Analysis

, Volume 46, Issue 3, pp 512–515 | Cite as

Standardization in information security management

  • A. M. Fal’
Brief Notes


The paper describes the state of the art in the standardization in information security management. The requirements to the standards being developed, the types of standards, and the principles to adhere to are discussed. The study is based on the documents adopted within the subcommittee 27 “IT Security techniques” of the joint technical committee ISO/IEC JTC 1 “Information technology”.


information security model of management systems standard risk management guidelines process model 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    I. N. Kovalenko and A. I. Kochubinskii, “Asymmetric cryptographic algorithms,” Cybern. Syst. Analysis, 39, No. 4, 549–554 (2003).MATHCrossRefMathSciNetGoogle Scholar
  2. 2.
    DSTU 4145—2002, Information Technologies. Cryptographic Information Protection. Digital Signature based on Elliptic Curves. Creation and Verification, Dec. 28, 2002, Derzhspozhivstandart Ukrainy, Kyiv (2002).Google Scholar

Copyright information

© Springer Science+Business Media, Inc. 2010

Authors and Affiliations

  1. 1.V. M. Glushkov Institute of Cybernetics, National Academy of Sciences of UkraineKyivUkraine

Personalised recommendations