DRAFTING A SECURITY CONCEPT FOR MIDDLEWARE INTEGRATION ENVIRONMENTS IN THE MANUFACTURING ENTERPRISE

Dorin-Vasile DEAC-ȘUTEU, Alina Bianca POP, Aurel Mihail ȚÎȚU

Abstract


Enterprise application security is a system of people, procedures, and technologies that ensures the security of an application by continuously measuring observable threats to all application assets. This framework protects an application by preventing unauthorized access to sensitive information. A first step in determining the security posture of applications used by the organization is to conduct an intelligence-gathering mission to understand how people work within the organization, what processes they use, and what technologies support the people and processes. This step should enable the development of a model, and IT management should develop a list of monitoring and performance indicators, develop the methodology for monitoring these indicators, and present the interpretation of the information to the organization’s management to make timely decisions about possible risks.  

Full Text:

PDF

References


Barometer, A. R. Global risks, https://www. agcs.allianz.com/news-and-insights/reports/ allianz-risk-barometer.html, January 2020

Global, A. Cyber risk trends 2020, https://www .agcs.allianz.com/news-and-insights/news/ cyber-risk-trends-2020.html, 2020'

Shevchenkoa, H., Shevchenko, S., Zhdanova, Y., Spasiteleva, S., Negodenko, O. Cybersecu¬rity Providing in Information and Telecommu¬nication Systems, Proceedings of Selected Pa¬pers of the Workshop on Cybersecurity Provid¬ing in Information and Telecommunication Systems (CPITS 2021) Kyiv, 2021, http://ceur-ws.org/Vol-2923/ paper 34.pdf, January 2021

NIST, Framework for Improving Critical In-frastructure Cybersecurity, version 1.1, 16 April 2018, https://doi.org/10.6028/NIST .CSWP.04162018

Pelzer, L.M., The True Cost of Cybersecurity Incidents: The Problem, https://www.paloalt onetworks.com/blog/2021/06/the-cost-of-cyb ersecurity-incidents-the-problem, 2021

Directive (EU) 2016/1148 of the European Parliament and of the Council of 6 July 2016 concerning measures for a high common level of network and information security within the Union, https://eur-lex.europa.eu/eli/dir/2016/1 148/oj, 2016

C.I.O. Council, CIO Handbook, https://www .cio.gov/cio-handbook/, 2021

I. 27001, Information technology - Security techniques - Information security management systems, https://www.iso.org/standard/54534 .html, July 2022

C. Point, Check Point Enterprise Security Framework, CESF, https://www.checkpoint. com/downloads/products/checkpoint-enterpri se-security-framework-whitepaper.pdf, 2020

IBM, Cost of a Data Breach Report 2020

Sava, J.A. Worldwide information security services spending from 2017 to 2022, https://www.statis¬ta.com/statistics/217362 /worldwide-it-security-spending-since-2010/, April 2022

IDC, IDC's Worldwide Security Spending Guide Taxonomy, 2021: Release V1, 2021, https://recordtrend.com/network-security/it-is-predicted-that-the-global-investment-in-net¬work-security-related-hardware-software-and-services-will-reach-143-5-billion-us-dollars-in-2021-from-idc/, February 2021

Verizon, Data Breach Investigations Report, https://www.verizon.com/business/ re-sources/reports/2022/dbir/2022-data-breach-investigations-report-dbir.pdf, 2022

Brooks, C. Alarming Cyber Statistics for Mid-Year 2022 That You Need to Know, https:// www.forbes.com/sites/chuck-brooks/2022/06/0 3/alarming-cyber-statistics-for-mid-year-2022-that-you-need-to-know/?sh=58310b837864, Ju ne 2022

M. 3. D. T. I. Team, Exploiting a crisis: How cybercriminals behaved during the outbreak, June 2020

Levanon, G., Remote Work: The Biggest Leg¬acy of Covid-19, https://www.forbes.com/sites /gadlevanon/2020/11/23/remote-work-the-biggest-legacy-of-covid-19/?sh=2e182df d7f59, November 2020

Arligton, V., Gartner CFO Survey Reveals 74% Intend to Shift Some Employees to Remote Work Permanently, https://www.gartner.com/ en/newsroom/press-releases/2020-04-03-gart ner-cfo-surey-reveals-74-percent-of-organiza-tions-to-shift-some-employees-to-remote-work-permanently2, April 2020

Dinha, F., The Hidden Cost of Remote Work, https://www.forbes.com/sites/forbestechcoun-cil/2021/03/30/the-hidden-cost-of-remote-wo-rk/?sh=639e2fd66947, March 2021

C. CEMR, European Charter of Services of General Interest at Local and Regional Level, https://www.ccre.org/img/uploads/piecesjointe /filename/charter_sgi_RO.pdf, March 2009

Deac-Suteu, D.-V., Titu, M.-A., Stanciu, A., The Reference Architecture of An Integrated Service Middleware Hub in The Environment of Knowledge-Based Organizations, ECAI, Cluj Napoca, 2021.

Microsoft, Evolving Zero Trus, https://query. prod.cms.rt.mi-crosoft.com/cms/api/am/binary /RWJJdT. November 2021

Puiu A. Playtech - How to find out all devices connected to your wireless network, https://play tech.ro/2017/cum-afli-toate-dispozitivele-conectate-la-reteaua-wireless/, March 2017


Refbacks

  • There are currently no refbacks.


JOURNAL INDEXED IN :