MAJOR PROBLEMS OF CONFIDENTIAL INFORMATION PROTECTION AND THE WAYS OF THEIR SOLUTION

Author(s):  
Вера Шумилина ◽  
Vera Shumilina ◽  
Юлия Коптева ◽  
Yulia Kopteva ◽  
Сатине Тевосян ◽  
...  

The authors disclose the basic concepts of this topic, prove the relevance, consider the types of threats to confidential information and methods of protection, both legal and organizational, presented an algorithm for creating a system for protecting confidential information.

Author(s):  
Алексей Горлов ◽  
Aleksey Gorlov ◽  
Михаил Рытов ◽  
Mikhail Rytov ◽  
Дмитрий Лысов ◽  
...  

This article discusses the process of automating the assessment of the effectiveness of software and hardware information protection by creating an automated system. The main functions of the proposed system are: conducting an audit of information security, forming a model of information security threats, forming recommendations for creating a software and hardware system for protecting information, and creating organizational-technical documentation. The developed automated system for evaluating the effectiveness of software and hardware protection of information allows in an automated way to build a model of information security threats, to form organizational and technical documentation governing the protection of confidential information, and also to make recommendations for improving the software and hardware system for protecting information. The use of this system will significantly reduce the time and material costs of auditing information security and developing additional measures to protect information.


Author(s):  
Maryna Tsilyna

The purpose of the article is to establish the features and types of modern documentary information thathas intellectual value; finding out the principles on which to build a secure document flow; characteristics ofthe main technological stages and procedures for the implementation of confidential documents; identifyingthreats that may arise during this process. The methodology consisted of a set of general scientific, specialscientific and specific methods of studying the problem, the application of which allows to achieve the goal.Scientific intelligence was based on the principles of objectivity and integrity. The use of a set of scientificmethods made it possible to study the specifics of valuable documentary information, to find out the mainchannels of information leakage, to trace the stages of document circulation of such business papers. Scientificnovelty. The latest international practices of working with confidential documents are studied. Featuresand types of documentary information that has intellectual value for the entrepreneur are established. Theprinciples on which it is necessary to build a secure document flow are formulated. The main technologicalstages and procedures of execution of confidential documents are outlined. The main threats that may ariseduring this process have been identified. Conclusions. Confidential information allows any company to operatesuccessfully due to the security of information. The importance of such information determines the risk of itsloss. In order to avoid inconveniences related to the loss or theft of information, the institutions should createappropriate services, whose representatives monitor confidential information, document circulation, createdatabases for computers and files for paper media, destroy drafts of confidential documents, store and destroydocuments that are valuable in the prescribed manner.Keywords: execution of a confidential document, secrecy stamp, information protection, technologicalcomplexity, value of documentary information.


2018 ◽  
pp. 48-58
Author(s):  
I P Mikhnev ◽  
Nataliia Anatol'evna Sal'nikova ◽  
Irina Petrovna Medintseva

The monograph presents studies of information protection tools against unauthorized access to automated radionuclide spectrometry systems based on a scintillation gamma spectrometer. As a result of the conducted researches, the system's security indicators have been obtained, which allow to calculate and optimize the probability of damage from unauthorized access taking into account the operating time and the applied information protection means. The developed analytical estimations allow to calculate the upper and lower bounds of the probability of unauthorized access to confidential information at the design stages of automated systems.


Author(s):  
Jack J. Murphy

This chapter presents some basic concepts for the design, implementation, and management of a network-based enterprise boundary protection mechanism. The reader should not expect to see a complete security solution from the material presented in this chapter. The concepts presented here must be combined with host and application security mechanisms, as well as procedural and administrative mechanisms. The chapter will provide an explanation of some of the security concepts involved before explaining how an information protection network (IPN) enables collaboration and information exchange between the enterprise and external entities on the public Internet. Finally, specific technologies needed to implement an IPN will be discussed.


2016 ◽  
Vol 8 (3) ◽  
pp. 70-73
Author(s):  
Зиновьев ◽  
P. Zinovev ◽  
Обухова ◽  
L. Obukhova ◽  
Рогозин ◽  
...  

The article describes the structure and composition of typical confidential information resource and the main directions of ensuring information security in electronic document management system.


2012 ◽  
Vol 5 (12) ◽  
pp. 1452-1461 ◽  
Author(s):  
Sang-Guun Yoo ◽  
Keun-Young Park ◽  
Juho Kim

2021 ◽  
Vol 46 (2) ◽  
Author(s):  
K. S. Irza ◽  
◽  
D. O. Guy

The paper presents the main functions of social networks and the data contained in them. Spectra of attacks and countermeasures are considered. Threats and technologies of information protection are investigated and the variant of technology of protection of personal and confidential information in social networks is developed. Introducing the first prototype of P2P Messenger, written in Java, which can run on several operating systems, such as Windows, Linux and MacOS.


Sign in / Sign up

Export Citation Format

Share Document