The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This article discusses aspects of the implementation and audit of the risk management system, implemented on the basis of modern standards for the enterprises of the oil and gas industry. Shows several practical examples of the implementation of the risk management process in the PDCA cycle proposed IMS model which contains all the basic entities to perform the audits (criteria, metrics, finding etc...
In accordance with Federal law N»44-“About contract system in the procurement of goods, works and services for state and municipal needs” customers are given the opportunity to consider the factors of experience and reputation in the selection of the contractor in the implementation of procurement within the “business criteria reputation “procurement participant. The normative basis for the evaluation...
This publication discusses the problem concerning the concept of the instantaneous information security (IT-Security) audits directed, including providing protection against “zero-day” threats. It is noted that effective “zero-day” counteraction based on implementation a set of preventive IT-Security controls, but not limited new technical facilities installation only. A key feature of this concept...
The application of Integrated Management Systems (IMS) is now attracting the attention of TOP management of a variety of organizations: refineries, machinery, instrument-making, aviation, defense, etc. However, now the major problem is still the performance of IMS audits as full implementation of complex checks from different ISO standards with a substantial limitation or reduction of available resources...
This publication discusses the problem of compliance evaluation for electronic services (ES). The relevance of this publication caused certain problems in the ES organization, formation of international confidence in the ES provided, as well as a wide range of approaches to ensure IT-security. It is noted that along with well-known standards set by the various national regulators, well-known term...
The article deals with the issue of information security. The purpose of the research is to analyze information security procedures, development information security systems and implementation of international information security standards. Information security involves both storing and accessing sensitive information and data warehousing. It can be carried out with Data Processing Centers. A number...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.