scholarly journals Modern technologies of protection and processing of confidential documentary information in organizations and institutions of different forms of ownership

Author(s):  
Maryna Tsilyna

The purpose of the article is to establish the features and types of modern documentary information thathas intellectual value; finding out the principles on which to build a secure document flow; characteristics ofthe main technological stages and procedures for the implementation of confidential documents; identifyingthreats that may arise during this process. The methodology consisted of a set of general scientific, specialscientific and specific methods of studying the problem, the application of which allows to achieve the goal.Scientific intelligence was based on the principles of objectivity and integrity. The use of a set of scientificmethods made it possible to study the specifics of valuable documentary information, to find out the mainchannels of information leakage, to trace the stages of document circulation of such business papers. Scientificnovelty. The latest international practices of working with confidential documents are studied. Featuresand types of documentary information that has intellectual value for the entrepreneur are established. Theprinciples on which it is necessary to build a secure document flow are formulated. The main technologicalstages and procedures of execution of confidential documents are outlined. The main threats that may ariseduring this process have been identified. Conclusions. Confidential information allows any company to operatesuccessfully due to the security of information. The importance of such information determines the risk of itsloss. In order to avoid inconveniences related to the loss or theft of information, the institutions should createappropriate services, whose representatives monitor confidential information, document circulation, createdatabases for computers and files for paper media, destroy drafts of confidential documents, store and destroydocuments that are valuable in the prescribed manner.Keywords: execution of a confidential document, secrecy stamp, information protection, technologicalcomplexity, value of documentary information.

Author(s):  
Вера Шумилина ◽  
Vera Shumilina ◽  
Юлия Коптева ◽  
Yulia Kopteva ◽  
Сатине Тевосян ◽  
...  

The authors disclose the basic concepts of this topic, prove the relevance, consider the types of threats to confidential information and methods of protection, both legal and organizational, presented an algorithm for creating a system for protecting confidential information.


Author(s):  
Алексей Горлов ◽  
Aleksey Gorlov ◽  
Михаил Рытов ◽  
Mikhail Rytov ◽  
Дмитрий Лысов ◽  
...  

This article discusses the process of automating the assessment of the effectiveness of software and hardware information protection by creating an automated system. The main functions of the proposed system are: conducting an audit of information security, forming a model of information security threats, forming recommendations for creating a software and hardware system for protecting information, and creating organizational-technical documentation. The developed automated system for evaluating the effectiveness of software and hardware protection of information allows in an automated way to build a model of information security threats, to form organizational and technical documentation governing the protection of confidential information, and also to make recommendations for improving the software and hardware system for protecting information. The use of this system will significantly reduce the time and material costs of auditing information security and developing additional measures to protect information.


Author(s):  
Vera Shumilina ◽  
Elena Tetunashvili

The article is devoted to the study of information security as an integral part of the economic security of any modern enterprise. Threats are described that can lead to disclosure of confidential information, leakage of confidential information, unauthorized access to protected information, etc. Means and ways of countering the presented threats are also given


Author(s):  
Borkovska I.P. ◽  
Karachun Yu.H.

Purpose. The purpose of this article is to identify the main types of encouraging constructions in English letters of confidentiality.Methods. Both general scientific methods and linguistic methods are used in the work. The research is methodologically based on analysis, descriptive method, continuous selection, definitional, semantic and syntactic analysis.Results. A confidential letter as a text version of the sub-style of commercial correspondence within the official business functional style is interpreted as a regulated type of business letters, which has both specific and general features, due to the affiliation of genre groups to one functional style. It is characterized by certain language features; stability of stylistic devices of the genre, its form provides the communicative properties of the document, which are manifested in the composition and architectonics. The text of the confidential letter provides information about the reason for writing the letter, states the need to ensure the confidentiality of information related to the contract, regulates specific mechanisms of cooperation between partners in the use and disposal of classified information. Since the main purpose of such a letter is to force the recipient to perform certain actions, a confidential letter contains many constructions with a motivating value. Encouraging constructions in the texts of business letters are diverse in their semantics, among which the most frequent constructions express directives.The directive is implemented in the form of three types, which are classified by the degree of categoricalness: the actual directive (with the maximum degree of expression of categoricalness); directive-instruction (the degree of categoricalness decreases); directive-request (categoricalness is minimal, but the directive remains). Typical language formulas are presented, which help to classify these types of speech.Conclusions. Therefore, a confidential letter refers to regulated letters, the purpose of which is to establish the procedure for the use of confidential information. To do this, the addressee uses encouraging constructions, diverse in their semantics, among which constructions that express directives stand out.Key words: business letter, genre, modal verbs, confidentiality, directives. Мета. Мета цієї статті – виявити основні типи cпонукальних конструкцій в англомовних конфіденційних листах.Методи. У роботі використано як загальнонаукові методи, а саме: аналізу, описовий метод, суцільного вибирання, так і лінгвістичні методи: дефініційний, семантичний та синтаксичний аналізи.Результати. У процесі дослідження доведено, що діловий лист виокремлюється як жанр, який має критерії, що характерні будь-якому жанру, а саме: текстовий варіант ділового листа має свою назву завдяки наявності формуляру, який і відповідає назві цього документа; ділові листи оформлюються з урахуванням чітких вимог до композиції, що співвідноситься з жанро-вою формою; сюжет, що представлений у тексті листа, наповнений мовними етикетними формулами; діловий лист має обсяг, який відповідає типу листа; жанрова група ділових листів представлена різними текстами-варіантами.Конфіденційний лист належить до регламентованих листів зі своїм набором реквізитів, архітектонікою і композицією. Текстова частина дає інформацію про привід складання листа, констатує необхідність забезпечення конфіденційності відо-мостей, пов’язаних із договором, регулює конкретні механізми співпраці партнерів під час користування і розпорядження секретною інформацією. Оскільки основна мета такого листа – змусити адресата виконати певні дії, конфіденційний лист міс-тить значну кількість конструкцій зі спонукальним значенням. Спонукальні конструкції в текстах ділових листів різноманітні за своєю семантикою, які можуть виражати розпорядження, прохання, пропозиції. Розпорядження реалізуються у вигляді трьох типів, які прокласифіковано за ступенем категоричності: власне-розпорядження (з максимальним ступенем вираження категоричності); розпорядження-інструкція (ступінь категоричності знижується); розпорядження-прохання (категоричність мінімальна, але директивність зберігається).Представлено типові мовні формули, які допомагають класифікувати зазначені типи мовлення. Типова мовна формула для першого типу мовлення, а саме власне-розпорядження, акцентує увагу на тому, що суб’єкт повинен здійснити певні дії, необхідні для досягнення результату. Ефективність виконання розпорядження визначається правильно поставленою метою адресантом та адекватним вибором мовних засобів, серед яких превалюють модальні дієслова will, must, shall. Розпоряджен-ня-інструкція належить до другого типу розпоряджень, коли ступінь категоричності в повідомленні знижується. Такий тип розпорядження означає висловлювання вимоги щодо правил і необхідних умов типових дій у тій чи іншій ситуації. Розпоря-дження-прохання реалізує комунікативну мету адресанта змусити адресата підписати лист або зробити заключні дії, необхідні для підписання контракту.Висновки. Отже, конфіденційний лист належить до регламентованих листів, текст яких розвивається в певну жанрову форму і реалізує мовний задум адресанта встановити порядок використання конфіденційної інформації. Конфіденційний лист як текстовий варіант жанру ділового листа містить спонукальні конструкції, які характеризуються різноманітністю мовних засобів вираження.Ключові слова: діловий лист, жанр, модальне дієслово, конфіденційність, розпорядження.


2018 ◽  
pp. 48-58
Author(s):  
I P Mikhnev ◽  
Nataliia Anatol'evna Sal'nikova ◽  
Irina Petrovna Medintseva

The monograph presents studies of information protection tools against unauthorized access to automated radionuclide spectrometry systems based on a scintillation gamma spectrometer. As a result of the conducted researches, the system's security indicators have been obtained, which allow to calculate and optimize the probability of damage from unauthorized access taking into account the operating time and the applied information protection means. The developed analytical estimations allow to calculate the upper and lower bounds of the probability of unauthorized access to confidential information at the design stages of automated systems.


2019 ◽  
Vol 9 ◽  
pp. 25-29
Author(s):  
Valentin Selifanov ◽  
Oksana Ermak ◽  
Anna Yakunina ◽  
Karina Yarkova

The process of the development of means of information protection can be divided into three stages: invention of writing, emergence of technical means of information processing and period of mass Informatization of society. Each stage is characterized by the development of information carriers, as a result of which there are new threats of information leakage. In this connection there is a necessity of formation of requirements to protection of information and information systems.


Author(s):  
V. V. Alekseev ◽  
◽  
V. A. Gridnev ◽  
A. V. Yakovlev ◽  
O. S. Mashkova ◽  
...  

In order to train specialists in information security (IS), a software and hardware complex “Means of protecting information from leakage through technical channels” has been developed; it provides an opportunity to study the process of information leakage through technical channels and methods of its protection, as well as apply various modules and additional software (software) that clearly demonstrate the features of various methods of information security. The composition of this complex is shown: laboratory stands simulating acoustic, vibroacoustic, acoustoelectric channels and a channel of side electromagnetic radiation and interference. At each of the stands there are information security means (ISMs) that prevent the leakage of confidential information through the corresponding technical channel. To adjust the ISMs for acoustic and vibroacoustic channels, the ISIDORA software has been developed; it allows adjusting the level of the generated acoustic interference to meet the requirements of the security of the room and at the same time to have a comfortable conversation in this room.


Author(s):  
A.R. Aidinyan ◽  
◽  
O.L. Tsvetkova ◽  

Agricultural enterprises are interested in preventing information leakage. Detection and blocking of information leakage channels are possible only when using a set of measures that include technical, organizational, and legal ones. The article deals with issues related to the protection of confidential company information leakage in the enterprises of the agro-industrial complex.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Lei Huang ◽  
Jingyi Zhou ◽  
Jiecong Lin ◽  
Shengli Deng

PurposeIn the era of big data, people are more likely to pay attention to privacy protection with facing the risk of personal information leakage while enjoying the convenience brought by big data technology. Furthermore, people’s views on personal information leakage and privacy protection are varied, playing an important role in the legal process of personal information protection. Therefore, this paper aims to propose a semi-qualitative method based framework to reveal the subjective patterns about information leakage and privacy protection and further provide  practical implications for interested party.Design/methodology/approachQ method is a semi-qualitative methodology which is designed for identifying typologies of perspectives. In order to have a comprehensive understanding of users’ viewpoints, this study incorporates LDA & TextRank method and other information extraction technologies to capture the statements from large-scale literature, app reviews, typical cases and survey interviews, which could be regarded as the resource of the viewpoints.FindingsBy adopting the Q method that aims for studying subjective thought patterns to identify users’ potential views, the authors have identified three categories of stakeholders’ subjectivities: macro-policy sensitive, trade-offs and personal information sensitive, each of which perceives different risk and affordance of information leakage and importance and urgency of privacy protection. All of the subjectivities of the respondents reflect the awareness of the issue of information leakage, that is, the interested parties like social network sites are unable to protect their full personal information, while reflecting varied resistance and susceptibility of disclosing personal information for big data technology applications.Originality/valueThe findings of this study provide an overview of the subjective patterns on the information leakage issue. Being the first to incorporate the Q method to study the views of personal information leakage and privacy protection, the research not only broadens the application field of the Q method but also enriches the research methods for personal information protection. Besides, the proposed LDA & TextRank method in this paper alleviates the limitation of statements resource in the Q method.


2021 ◽  
Vol 39 (6) ◽  
Author(s):  
Olena Yu. Sova ◽  
Liudmyla A. Kyslova ◽  
Liliia V Semkova ◽  
Lyudmila Yu. Krasavtceva ◽  
Tetiana B. Samonova

The development of the information sphere and the corresponding increase in its volume and cost is accompanied by the introduction of advanced information technologies in all spheres of public life of the state, which leads to an increase in the frequency of attacks and potential losses from information leakage. As a result, the complexity of protection systems and an increase in their cost. In these conditions, the task to efficiently distribute limited financial resources to protect the information of business entities becomes more and more important and largely determines the level of financial and economic security of the enterprise and the state as a whole. Of particular relevance is the development of issues of optimisation of indicators of the information security system in a dynamic confrontation. Such indicators can be the amount of damage caused from the implementation of information threats, which determines the effectiveness of the protection system, the profit from making investments in information protection, their profitability, and the like. It was established that it is necessary to determine the total amount of protection resources, which minimises the total losses from possible information leakage in conditions of instability. The authors believe that the optimal control mechanism is the distribution of resources between objects that contain a different share of information and are distinguished by natural security, dynamic vulnerability, and the probability of an attack with the allocation of a certain amount of resources. The practical significance of the study lies in determining the optimal moment for the introduction of defence resources – after the direction and intensity of attacks and, accordingly, the possible level of losses was clarified.


Sign in / Sign up

Export Citation Format

Share Document