<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author><author><style face="normal" font="default" size="100%">George Sharkov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Computationally intensive functions in designing and operating distributed cyber secure and resilient systems</style></title><secondary-title><style face="normal" font="default" size="100%">20th International Conference on Computer Systems and Technologies, CompSysTech 2019</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">agility</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">distributed systems</style></keyword><keyword><style  face="normal" font="default" size="100%">high-performance computing</style></keyword><keyword><style  face="normal" font="default" size="100%">operations</style></keyword><keyword><style  face="normal" font="default" size="100%">policy</style></keyword><keyword><style  face="normal" font="default" size="100%">resilience</style></keyword><keyword><style  face="normal" font="default" size="100%">risk management</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2019</style></year><pub-dates><date><style  face="normal" font="default" size="100%"> 21 June 2019</style></date></pub-dates></dates><publisher><style face="normal" font="default" size="100%">University of RuseRuse</style></publisher><pub-location><style face="normal" font="default" size="100%">Bulgaria</style></pub-location><volume><style face="normal" font="default" size="100%">ACM International Conference Proceeding Series</style></volume><pages><style face="normal" font="default" size="100%"> 8-18</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Increasing incorporation of advanced information technologies makes business and public organisations more effective and efficient, while often introducing exploitable vulnerabilities. The efficient provision of security of interconnected, and interdependent, processes and sectors against cyberattacks requires deep understanding of vulnerabilities, exposure, potential negative impact, as well as the contribution existing and emerging organisational and technological solutions will potentially have on preventing attacks, reducing vulnerabilities, protecting digital infrastructures, response and recovery, and resilience. Such understanding will allow minimisation of risks against a spectrum of plausible cyber threats and reducing negative consequences of one or a series of cyberattacks.&lt;/p&gt;&lt;p&gt;Due to the complexity of the problem, the effective implementation of a number of functions and tasks in designing and operating distributed cyber secure and resilient systems require significant computational resources. This paper outlines six high-level, computationally demanding functions. The first three relate to the formulation and implementation of cybersecurity policy: understanding risk; planning and implementing cybersecurity measures; and continuous adaptation to the changing technological, threat and policy landscape. The other three functions are operational: situational awareness, including detection of cyberattacks and hybrid malicious activities; operational decision making, e.g. selecting a course of action under attack; and cyber forensics.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author><author><style face="normal" font="default" size="100%">Dimitrina Polimirova</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Main considerations in elaborating organizational information security policies</style></title><secondary-title><style face="normal" font="default" size="100%">20th International Conference on Computer Systems and Technologies, CompSysTech 2019</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">Information Security</style></keyword><keyword><style  face="normal" font="default" size="100%">information security management</style></keyword><keyword><style  face="normal" font="default" size="100%">policy</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2019</style></year><pub-dates><date><style  face="normal" font="default" size="100%">21 June 2019</style></date></pub-dates></dates><publisher><style face="normal" font="default" size="100%">University of RuseRuse</style></publisher><pub-location><style face="normal" font="default" size="100%">Bulgaria</style></pub-location><volume><style face="normal" font="default" size="100%">ACM International Conference Proceeding Series</style></volume><pages><style face="normal" font="default" size="100%">68-73</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;With the increasing reliance on information technologies, cloud services and internet as communications media, businesses, public and societal organizations face growing threats from cyberspace and, respectively, demands to protect sensitive data and information they collect, use, and disseminate. This paper elaborates on the key considerations organisations with more limited resources, such as schools, universities, research institutes and public organizations need to take into account in designing and implementing a respective information security policy. We start with a description of context and definition of the scope of information security policy, in particular delineating &amp;#39;information&amp;#39; and &amp;#39;cyber&amp;#39; security, and provide an overview of the most prominent frameworks and standards. On that basis we elaborate and structure the main areas of an information security policy, the main implementation challenges, and the need to review and amend the policy in a continuous cycle and comprehensive risk management framework. Depending of the specifics of their work, any school, university, institute and municipality may use this elaboration as a starting point in devising its own information security policy.&lt;/p&gt;</style></abstract></record></records></xml>