PROTECTION OF INFORMATION IN AUTOMATED SYSTEMS OF SECURITY ACTIVITY SUBJECTS

The information security of the subject of the security activity, is in the protection of the interests of the security activity subject, connected with protection from unauthorized access to those data that are important in the work of the security activity subject. Critical data can be presented b...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Sučasnì ìnformacìjnì tehnologìï u sferì bezpeki ta oboroni 2018-08 (2(32)), p.17-22
Hauptverfasser: Oleg O. Shkarlat, Roman M. Shtonda, Yulia A. Chernish, Maria M. Sulimovska
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:The information security of the subject of the security activity, is in the protection of the interests of the security activity subject, connected with protection from unauthorized access to those data that are important in the work of the security activity subject. Critical data can be presented by a combination of information that is able to satisfy the owner's interest, and his actions aimed at mastering information or a screen of information. These data are protected against external and internal threats. In the case when the subject of the hunting activity does not see the need to protect its actions, for example, due to the fact that this does not pay off, the content of information security can be reduced to the protection of specific information, the disclosure of which may cause a noticeable loss of activity. Confidential for the subject of security activities information is in the sphere of increased interest of competing companies. For unscrupulous competitors, corrupt officials and other intruders, information about the composition of the organization's management, its status and activities is of particular interest. Such information usually refers to trade secrets. In some cases, also ensuring the kidnapping of 1/5 of confidential information can have a critical impact on financial security.
ISSN:2311-7249
2410-7336