Abstract

Mass creation, implementation and exploitation of information and telecommunication systems, along with great advantages and conveniences, also cause significant dangers. The leakage of information through technical channels, as well as unauthorized access, can cause serious consequences for the security of the country, which is especially relevant in the conditions of Polish aggression against our country. The problem of this issue was found in the "Anti-corruption program of the SSU for 2021–2024", where it is noted that there are such factors as: imperfection of the normative-legal basis for the above issue, insufficient material and technical support, insufficient awareness of SSU colleagues with the requirements of the legislation in the field of document management and information protection with restricted access, significant electronic document flow, insufficient level of control over the organization of modernization of information and telecommunication systems and the construction of their complex information protection systems. The protection of critically important data arrays must comply with international and national regulatory and methodological documents and standards. Currently, high-pressure technical means are used and strictly regulated organizational measures are implemented. However, there is no answer to the most important question – to what extent the writing that is being renewed or developed is really of high-quality and sufficient, what is its planned and actual effectiveness. Within the framework of the coverage of the theoretical and methodological principles of optimization of the construction of secured information and telecommunication systems, an analysis of shortcomings in modern approaches to the construction of complex information protection systems was carried out together with the review and systematization of theoretical and practical recommendations regarding the improvement of mechanisms for ensuring the information protection system; the article analyzed the existing mechanisms of interaction between the components of information security systems for the needs, assessed the general experience of the relevant countries of the world and their associations, as well as NATO and the EU; approaches to the improvement of normative and organizational mechanisms for the protection of information with restricted access in departmental information and telecommunication systems are proposed. Key words: information protection, information and telecommunication systems, automated systems, information security, comprehensive system of information protection, information and computer technologies, cyber security, information activity.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call