Method of Maturity Assessment of Air Traffic Management Security System
DOI:
https://doi.org/10.30837/rt.2018.4.195.22Keywords:
risk, management security, provider, information security, system maturityAbstract
The protection of the air traffic management system infrastructure of the air navigation services provider is carried out by ensuring the security of information and telecommunications systems, physical security, personnel security and ensuring the continuity of air navigation services provision. Here the authors first proposed a method for assessing the maturity of a security management system in the air traffic management system of air navigation service provider. The proposed method allows determining the actual and predicted levels of compliance of the security management system in the air traffic management system to the current requirements of regulatory legal acts, international standards, taking into account the weight coefficients.References
Повітряний кодекс України від 19.05. 2011. – № 3393-VI.
Керівництво з безпеки системи організації повітряного руху, DOC ICAO 9985.
Денис М. Ахен, Арон Клауз, Ричард Тернер CMMI: Комплексный подход к совершенствованию про-цессов. Практическое введение в модель. – Москва : МФК, 2005. – 300 с.
ДСТУ ISO/IEC TR 15504-4:2002 Інформаційні технології. Оцінювання процесів життєвого циклу програмних засобів. Ч. 4. Настанови з виконання оцінювання (ISO/IEC TR 15504-4:1998, IDТ).
Проверка и оценка деятельности по управлению информационной безопасностью : учеб. пособие для вузов / П.Г. Милославская, М.Ю. Сенаторов, А Н. Толстой. – Москва : Горячая Линия-Телеком, 2014. – 166 с.
Downloads
Published
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).