Analysis of the original data for the formation of information security policy at the enterprise

The article considers the factors that are to be analyzed in the process of information security policy formation at the enterprise as a whole and in each of its business processes in particular as well as the classification of information security threats (by the aspect of information security to w...

Full description

Bibliographic Details
Main Author: І.Y. Makovskyi
Format: Article
Language:English
Published: Zhytomyr Polytechnic State University 2020-03-01
Series:Економіка, управління та адміністрування
Subjects:
Online Access:http://ema.ztu.edu.ua/article/view/200772/200914
_version_ 1818664350131421184
author І.Y. Makovskyi
author_facet І.Y. Makovskyi
author_sort І.Y. Makovskyi
collection DOAJ
description The article considers the factors that are to be analyzed in the process of information security policy formation at the enterprise as a whole and in each of its business processes in particular as well as the classification of information security threats (by the aspect of information security to which the threats are directed, by the location of the source of threats, by the size of the damage caused, by the degree of influence on the information system, by the nature of its occurrence) and their potential carriers – security violators (by place of action, by motive, by level of knowledge of information system, by level of opportunity, by time of action). Based on the requirements of the current legislation, the author proposes to formulate the appropriate models of threats and violators, based on the needs of the enterprise, and taking into account the importance of the information to be protected. The analysis of threats and violators of information security allows the head of the company to formulate an optimal security policy, applying a specific set of measures aimed at its implementation. At the same time, particular attention is paid to the ratio of possible losses to expenditures aimed at preventing the realization of specific threats. The basis for further research on the formation of information security policy at the enterprise, with the identification of critical data, the loss of which can significantly affect the economic performance of the enterprise; forming of functional security profiles, taking into account the need for maximum protection at minimal cost.
first_indexed 2024-12-17T05:31:20Z
format Article
id doaj.art-6d9b04b68e354ec0be171b4b7e41446e
institution Directory Open Access Journal
issn 2664-245X
2664-2468
language English
last_indexed 2024-12-17T05:31:20Z
publishDate 2020-03-01
publisher Zhytomyr Polytechnic State University
record_format Article
series Економіка, управління та адміністрування
spelling doaj.art-6d9b04b68e354ec0be171b4b7e41446e2022-12-21T22:01:43ZengZhytomyr Polytechnic State UniversityЕкономіка, управління та адміністрування2664-245X2664-24682020-03-01191384210.26642/ema-2020-1(91)-38-42Analysis of the original data for the formation of information security policy at the enterpriseІ.Y. MakovskyiThe article considers the factors that are to be analyzed in the process of information security policy formation at the enterprise as a whole and in each of its business processes in particular as well as the classification of information security threats (by the aspect of information security to which the threats are directed, by the location of the source of threats, by the size of the damage caused, by the degree of influence on the information system, by the nature of its occurrence) and their potential carriers – security violators (by place of action, by motive, by level of knowledge of information system, by level of opportunity, by time of action). Based on the requirements of the current legislation, the author proposes to formulate the appropriate models of threats and violators, based on the needs of the enterprise, and taking into account the importance of the information to be protected. The analysis of threats and violators of information security allows the head of the company to formulate an optimal security policy, applying a specific set of measures aimed at its implementation. At the same time, particular attention is paid to the ratio of possible losses to expenditures aimed at preventing the realization of specific threats. The basis for further research on the formation of information security policy at the enterprise, with the identification of critical data, the loss of which can significantly affect the economic performance of the enterprise; forming of functional security profiles, taking into account the need for maximum protection at minimal cost.http://ema.ztu.edu.ua/article/view/200772/200914information securitymodel of threatsviolator modelconfidential information
spellingShingle І.Y. Makovskyi
Analysis of the original data for the formation of information security policy at the enterprise
Економіка, управління та адміністрування
information security
model of threats
violator model
confidential information
title Analysis of the original data for the formation of information security policy at the enterprise
title_full Analysis of the original data for the formation of information security policy at the enterprise
title_fullStr Analysis of the original data for the formation of information security policy at the enterprise
title_full_unstemmed Analysis of the original data for the formation of information security policy at the enterprise
title_short Analysis of the original data for the formation of information security policy at the enterprise
title_sort analysis of the original data for the formation of information security policy at the enterprise
topic information security
model of threats
violator model
confidential information
url http://ema.ztu.edu.ua/article/view/200772/200914
work_keys_str_mv AT íymakovskyi analysisoftheoriginaldatafortheformationofinformationsecuritypolicyattheenterprise