Analysis of the original data for the formation of information security policy at the enterprise
The article considers the factors that are to be analyzed in the process of information security policy formation at the enterprise as a whole and in each of its business processes in particular as well as the classification of information security threats (by the aspect of information security to w...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
Zhytomyr Polytechnic State University
2020-03-01
|
Series: | Економіка, управління та адміністрування |
Subjects: | |
Online Access: | http://ema.ztu.edu.ua/article/view/200772/200914 |
_version_ | 1818664350131421184 |
---|---|
author | І.Y. Makovskyi |
author_facet | І.Y. Makovskyi |
author_sort | І.Y. Makovskyi |
collection | DOAJ |
description | The article considers the factors that are to be analyzed in the process of information security policy formation at the enterprise as a whole and in each of its business processes in particular as well as the classification of information security threats (by the aspect of information security to which the threats are directed, by the location of the source of threats, by the size of the damage caused, by the degree of influence on the information system, by the nature of its occurrence) and their potential carriers – security violators (by place of action, by motive, by level of knowledge of information system, by level of opportunity, by time of action). Based on the requirements of the current legislation, the author proposes to formulate the appropriate models of threats and violators, based on the needs of the enterprise, and taking into account the importance of the information to be protected. The analysis of threats and violators of information security allows the head of the company to formulate an optimal security policy, applying a specific set of measures aimed at its implementation. At the same time, particular attention is paid to the ratio of possible losses to expenditures aimed at preventing the realization of specific threats. The basis for further research on the formation of information security policy at the enterprise, with the identification of critical data, the loss of which can significantly affect the economic performance of the enterprise; forming of functional security profiles, taking into account the need for maximum protection at minimal cost. |
first_indexed | 2024-12-17T05:31:20Z |
format | Article |
id | doaj.art-6d9b04b68e354ec0be171b4b7e41446e |
institution | Directory Open Access Journal |
issn | 2664-245X 2664-2468 |
language | English |
last_indexed | 2024-12-17T05:31:20Z |
publishDate | 2020-03-01 |
publisher | Zhytomyr Polytechnic State University |
record_format | Article |
series | Економіка, управління та адміністрування |
spelling | doaj.art-6d9b04b68e354ec0be171b4b7e41446e2022-12-21T22:01:43ZengZhytomyr Polytechnic State UniversityЕкономіка, управління та адміністрування2664-245X2664-24682020-03-01191384210.26642/ema-2020-1(91)-38-42Analysis of the original data for the formation of information security policy at the enterpriseІ.Y. MakovskyiThe article considers the factors that are to be analyzed in the process of information security policy formation at the enterprise as a whole and in each of its business processes in particular as well as the classification of information security threats (by the aspect of information security to which the threats are directed, by the location of the source of threats, by the size of the damage caused, by the degree of influence on the information system, by the nature of its occurrence) and their potential carriers – security violators (by place of action, by motive, by level of knowledge of information system, by level of opportunity, by time of action). Based on the requirements of the current legislation, the author proposes to formulate the appropriate models of threats and violators, based on the needs of the enterprise, and taking into account the importance of the information to be protected. The analysis of threats and violators of information security allows the head of the company to formulate an optimal security policy, applying a specific set of measures aimed at its implementation. At the same time, particular attention is paid to the ratio of possible losses to expenditures aimed at preventing the realization of specific threats. The basis for further research on the formation of information security policy at the enterprise, with the identification of critical data, the loss of which can significantly affect the economic performance of the enterprise; forming of functional security profiles, taking into account the need for maximum protection at minimal cost.http://ema.ztu.edu.ua/article/view/200772/200914information securitymodel of threatsviolator modelconfidential information |
spellingShingle | І.Y. Makovskyi Analysis of the original data for the formation of information security policy at the enterprise Економіка, управління та адміністрування information security model of threats violator model confidential information |
title | Analysis of the original data for the formation of information security policy at the enterprise |
title_full | Analysis of the original data for the formation of information security policy at the enterprise |
title_fullStr | Analysis of the original data for the formation of information security policy at the enterprise |
title_full_unstemmed | Analysis of the original data for the formation of information security policy at the enterprise |
title_short | Analysis of the original data for the formation of information security policy at the enterprise |
title_sort | analysis of the original data for the formation of information security policy at the enterprise |
topic | information security model of threats violator model confidential information |
url | http://ema.ztu.edu.ua/article/view/200772/200914 |
work_keys_str_mv | AT íymakovskyi analysisoftheoriginaldatafortheformationofinformationsecuritypolicyattheenterprise |