Dmitry Kupetsky lists specific practical difficulties in ensuring information security of current IT infrastructures.
IoT: a wide variety of IoT device types, requiring a corresponding variety of security tools; the complexity of monitoring the distribution and use of IoT devices as part of the infrastructure - additional organizational measures are needed to ensure the use and installation of information security tools on such devices, maintaining constant records and updating; rapid development and change of both the nomenclature and types of IoT devices, which requires the same rapid development of security tools (which is not always possible).
the IoT devices used must be as kazakhstan whatsapp data as possible (at least in terms of the types of OS used), be allowed to operate only after installing security tools, and support the capabilities of automatic control, accounting, and, in some cases, management.
Critical information infrastructures: the high criticality and operating conditions of such infrastructures make it extremely difficult to modernize them and implement security tools, since this most often requires stopping the systems for a certain period of time, which is often unacceptable; for the same reasons, critical information infrastructures often contain technologically obsolete equipment and do not have sufficient hardware and computing resources to accommodate modern security tools.
A reliable and effective way to implement a secure critical information infrastructure (albeit expensive) is to build such an infrastructure “from scratch”, taking into account current security requirements, with a performance reserve for several years ahead, in parallel to the existing system with subsequent simultaneous transfer of critical services and services from the old system to the new one.
To overcome these difficulties
-
- Posts: 816
- Joined: Sun Dec 22, 2024 7:16 am