Abstract

Problem. The wide spread of computer technology as a means of processing information has led to the informatization of society and the emergence of fundamentally new information technologies. Therefore, security should be taken care of in advance when developing and using such technologies. Today, the well-being, and sometimes the life of many people, depends on the degree of security of information technologies. In modern society, an important problem is the protection of information that has become a subject of purchase and sale in the market. In this regard, information security is now widely discussed. The task of every organization is to create such a protection system that would be resistant to the intervention of outsiders. This involves the security of networks and the entire infrastructure, protection of software and databases, regular audit of information systems. Goal. The purpose of the article is to determine directions for improving information security in relation to information activities, taking into account real and potential threats, as well as key tools for its provision. Methodology. Methods of scientific research in the field of administrative management in cyber security were used. Results. Loss of confidential information causes moral or material damage. Conditions contributing to the misappropriation of confidential information are its disclosure, leakage and unauthorized access to its sources. In current conditions, the security of information resources can be ensured only by comprehensive system protection of information. A comprehensive protection system should be: continuous, planned, targeted, specific, active, reliable. The protection system should be based on a system of types of self-support, capable of realizing its functioning in everyday conditions, in critical situations. Originality. Current threats in the field of attacks on enterprises were considered. Practical value. Existing problems of the development of the information security system, taking into account the new threat, the knowledge of which can be useful in ensuring information security by organizational, organizational, technical and technical measures are identified.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call