PROTECTION OF INFORMATION IN AUTOMATED SYSTEMS OF SECURITY ACTIVITY SUBJECTS

The information security of the subject of the security activity, is in the protection of the interests of the security activity subject, connected with protection from unauthorized access to those data that are important in the work of the security activity subject. Critical data can be presented b...

Full description

Saved in:
Bibliographic Details
Main Authors: Oleg O. Shkarlat, Roman M. Shtonda, Yulia A. Chernish, Maria M. Sulimovska
Format: Article
Language:English
Published: Національний університет оборони України 2018-08-01
Series:Sučasnì Informacìjnì Tehnologìï u Sferì Bezpeki ta Oboroni
Subjects:
Online Access:http://sit.nuou.org.ua/article/view/157606
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:The information security of the subject of the security activity, is in the protection of the interests of the security activity subject, connected with protection from unauthorized access to those data that are important in the work of the security activity subject. Critical data can be presented by a combination of information that is able to satisfy the owner's interest, and his actions aimed at mastering information or a screen of information. These data are protected against external and internal threats. In the case when the subject of the hunting activity does not see the need to protect its actions, for example, due to the fact that this does not pay off, the content of information security can be reduced to the protection of specific information, the disclosure of which may cause a noticeable loss of activity. Confidential for the subject of security activities information is in the sphere of increased interest of competing companies. For unscrupulous competitors, corrupt officials and other intruders, information about the composition of the organization's management, its status and activities is of particular interest. Such information usually refers to trade secrets. In some cases, also ensuring the kidnapping of 1/5 of confidential information can have a critical impact on financial security.
ISSN:2311-7249
2410-7336