RISK ASSESSMENT AND SECURITY MANAGEMENT IN CRITICAL INFRASTRUCTURE INFORMATION SYSTEMS

Ruslan B. Senaliev

Master’s Student, Department of Information Security,

Volgograd State University
This email address is being protected from spambots. You need JavaScript enabled to view it.
Prosp. Universitetsky, 100, 400062 Volgograd, Russian Federation

Vladislav G. Yarikov

Candidate of Sciences (Pedagogy),
Associate Professor, Department of Information Security,

Volgograd State University
This email address is being protected from spambots. You need JavaScript enabled to view it.
Prosp. Universitetsky, 100, 400062 Volgograd, Russian Federation

Abstract. This article analyzes the main approaches to risk assessment and security management of information systems in the critical infrastructure sector. It discusses methods of risk assessment, security strategies, and planning for incident response. Special attention is given to legislative aspects and standards, both international and specific to Russia, as well as to current technological trends and future developments in the field of critical infrastructure protection. Ensuring the security of critical infrastructure in today’s digital world is a priority task that requires a comprehensive approach and constant adaptation to changing conditions. The importance of proactive risk assessment and the development of security management strategies cannot be overemphasized, as they ensure the reliability and stability of vital societal functions. Legislation and standards provide the foundation for protection, but their effectiveness depends on the ability to innovate and collaborate at all levels, from national to international. The introduction of new technologies offers significant promise for improving security but also brings with it new challenges. In the future, the key to critical infrastructure protection will be innovation, knowledge sharing, and a deep understanding of threats. Continuous improvement, coordinated efforts by government, business, and the international community, and adaptation to new realities and technologies will determine long-term security success.

Key words: risk assessment, security management, critical infrastructure, information systems, new technologies, cyber threats.

 

Creative Commons License
This work is licensed under a 
Creative Commons Attribution 4.0 International License.
Attachments:
Download this file (3_Senaliev, Yarikov.pdf) 3_Senaliev, Yarikov.pdf
URL: https://ti.jvolsu.com/index.php/en/component/attachments/download/936
1 DownloadUpdate this file (3_Senaliev, Yarikov.pdf)