Modeling Computer Security Service Desk

Author(s):  
Sabah Al-Fedaghi ◽  
Basmah AlMusallam
2004 ◽  
Author(s):  
Sara Kraemer ◽  
Pascale Carayon ◽  
Ruth Duggan

2006 ◽  
Author(s):  
Jefferson B. Hardee ◽  
Christopher B. Mayhorn ◽  
Ryan West
Keyword(s):  

2020 ◽  
Vol 23 (11) ◽  
pp. 1291-1312
Author(s):  
N.V. Zyleva

Subject. This article discusses the practice of ensuring the economic security of oil and gas companies operating under the terms of production sharing agreements, where minerals are the object of security. Objectives. The article aims to justify the need to apply professional judgment in the organization of reliable accounting of minerals, explored and extracted under the terms of the production sharing agreement implementation, to avoid various risks to the entity's economic security. Methods. For the study, I used the methods of deduction and modeling. Results. The article presents proposals to arrange accounting of intangible exploration assets (geological information on mineral reserves) and finished products (the part of the extracted minerals owned by the investor and the part owned by the State). Conclusions. As strategic minerals, oil and gas are the targets of various economic risks. Professionals familiar with the specifics of accounting operations in the implementation of the production sharing agreement should be prepared to prevent these risks. The results obtained can be used to design accounting policies and develop local regulations on the tasks and functions of the economic security service of the organization implementing the production sharing agreement.


Author(s):  
Ilia Pavlovich Mikhnev ◽  
Svetlana Vladimirovna Mikhneva

The article discusses the competences and powers of the state authorities of the Russian Federation within their legal status in the field of ensuring the security of critical information infrastructure. Some functions and authorities in the field of information security have changed in a number of federal executive bodies. In particular, the Federal Security Service, on the basis of a presidential decree, is authorized to create a state system for detecting, preventing and eliminating the consequences of computer attacks on information resources of the Russian Federation. However, not all rights and obligations are enshrined; a number of powers cause the duality of the legal status of certain federal bodies of state power. The clarity and unambiguity of securing the rights and obligations of state bodies authorized in the field of information security are guarantees for effectively ensuring the security of important information infrastructure facilities.


2001 ◽  
Author(s):  
SECRETARY OF THE AIR FORCE WASHINGTON DC
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document