Conceptual principles for ensuring effective protection of information in the context of economic security of the enterprise

Author:

Pecheniuk A.V.1ORCID

Affiliation:

1. Podolsk State Agrarian Technical University, Podolsk, Ukraine

Abstract

The necessity of formation of an effective information security system of the enterprise is substantiated. It is emphasized that when designing an information policy, the firm must comply with the requirements of the current legislation, take into account the level of technical support, especially the regulation of employees' access to confidential information, etc. It is stated that the costs of organizing information security measures should be appropriate to its value. The article identifies major threats that could be breached by confidential information. The list of the main normative legal acts aimed at bringing to civil, administrative and criminal responsibility for illegal collection, disclosure and use of information constituting a trade secret. The main stages of building an information security policy are summarized, the most common types of information threats related to the use of modern computer technologies are described. The necessity of developing a domestic original accounting (management) program that could be used in the long term by the vast majority of Ukrainian enterprises is pointed out. There are three groups of tools that are applied in the theory and practice of information security of the enterprise (active, passive and combined), emphasizing the need for planning and continuous monitoring in real time of all important processes and conditions that affect data security. It is noted that even if the information security system is built taking into account all modern methods and means of protection, it does not guarantee one hundred percent protection of the information resources of the enterprise, but a well-designed information security policy allows to minimize the corresponding risks. Key words: information security, information policy, information security, confidential information, information threats, information and communication technologies, software.

Publisher

The Bila Tserkva National Agrarian University

Reference21 articles.

1. Mykytenko T.V., Petrovska I.O., Rohov P.D. (2014). Problemy informatsiinoi bezpeky subiektiv hospodariuvannia v Ukraini ta mozhlyvi shliakhy yikh vyrishennia v suchasnykh umovakh [Problems of informative safety of subjects of menage in Ukraine and possible ways of their decision are in modern terms]. Zbirnyk naukovykh prats Tsentru voienno-stratehichnykh doslidzhen Natsionalnoho universytetu oborony Ukrainy imeni Ivana Cherniakhovskoho [Collection of scientific works of Center of military-strategic researches of the National university of defensive of Ukraine of the name of Ivan Cherniakhovskii], no 1, pp. 24-31. Available at: http://journals.uran.ua/index.php/2304-2699/article/view/126694

2. Pecheniuk A.V. (2015). Problemy orhanizatsii efektyvnoho zakhystu informatsii [Problems of organization of effective protection of information]. Bukhhalterskyi oblik, kontrol ta analiz v umovakh instytutsionalnykh zmin ta staloho ekonomichnoho rozvytku [Accounting, control and analysis in the face of institutional change and sustainable economic development]: materialy II mizhnar. nauk.-prakt. internet-konf. 25 lystopada 2015 r. Ternopil, Krok, pp. 129-133.

3. Pro informatsiiu: Zakon Ukrainy [On Information]. Law of Ukraine. Available at: https://zakon.rada.gov.ua/laws/show/2657-12.

4. Pro zakhyst informatsii v informatsiino-telekomunikatsiinykh systemak: Zakon Ukrainy [On Information Protection in Information and Telecommunication Systems]. Law of Ukraine. Available at: https://zakon.rada.gov.ua/laws/show/80/94-%D0%B2%D1%80.

5. Pro rishennia Rady natsionalnoi bezpeky i oborony Ukrainy vid 27 sichnia 2016 roku. Pro Stratehiiu kiberbezpeky Ukrainy Ukaz Prezydenta Ukrainy. [On the Decision of the National Security and Defense Council of Ukraine of January 27, 2016. On the Cybersecurity Strategy of Ukraine]. Presidential Decree. Available at: https://zakon5.rada.gov.ua/laws/show/96/2016.

Cited by 2 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3