PROTECTION OF INFORMATION IN AUTOMATED SYSTEMS OF SECURITY ACTIVITY SUBJECTS

The information security of the subject of the security activity, is in the protection of the interests of the security activity subject, connected with protection from unauthorized access to those data that are important in the work of the security activity subject. Critical data can be presented b...

Full description

Saved in:
Bibliographic Details
Main Authors: Oleg O. Shkarlat, Roman M. Shtonda, Yulia A. Chernish, Maria M. Sulimovska
Format: Article
Language:English
Published: Національний університет оборони України 2018-08-01
Series:Sučasnì Informacìjnì Tehnologìï u Sferì Bezpeki ta Oboroni
Subjects:
Online Access:http://sit.nuou.org.ua/article/view/157606
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1849315594531241984
author Oleg O. Shkarlat
Roman M. Shtonda
Yulia A. Chernish
Maria M. Sulimovska
author_facet Oleg O. Shkarlat
Roman M. Shtonda
Yulia A. Chernish
Maria M. Sulimovska
author_sort Oleg O. Shkarlat
collection DOAJ
description The information security of the subject of the security activity, is in the protection of the interests of the security activity subject, connected with protection from unauthorized access to those data that are important in the work of the security activity subject. Critical data can be presented by a combination of information that is able to satisfy the owner's interest, and his actions aimed at mastering information or a screen of information. These data are protected against external and internal threats. In the case when the subject of the hunting activity does not see the need to protect its actions, for example, due to the fact that this does not pay off, the content of information security can be reduced to the protection of specific information, the disclosure of which may cause a noticeable loss of activity. Confidential for the subject of security activities information is in the sphere of increased interest of competing companies. For unscrupulous competitors, corrupt officials and other intruders, information about the composition of the organization's management, its status and activities is of particular interest. Such information usually refers to trade secrets. In some cases, also ensuring the kidnapping of 1/5 of confidential information can have a critical impact on financial security.
format Article
id doaj-art-4b4c4b4ade03414e92b167a4a530344a
institution Kabale University
issn 2311-7249
2410-7336
language English
publishDate 2018-08-01
publisher Національний університет оборони України
record_format Article
series Sučasnì Informacìjnì Tehnologìï u Sferì Bezpeki ta Oboroni
spelling doaj-art-4b4c4b4ade03414e92b167a4a530344a2025-08-20T03:52:06ZengНаціональний університет оборони УкраїниSučasnì Informacìjnì Tehnologìï u Sferì Bezpeki ta Oboroni2311-72492410-73362018-08-0102(32)1722157606PROTECTION OF INFORMATION IN AUTOMATED SYSTEMS OF SECURITY ACTIVITY SUBJECTSOleg O. Shkarlat0Roman M. Shtonda1Yulia A. Chernish2Maria M. Sulimovska3Association of Security Law Firms “Paladin”Military Institute of Telecommunications and Information named after Heroiv KrutMilitary Institute of Telecommunications and Information named after Heroiv KrutNational Defense University of Ukraine named after Ivan ChernyhovskiThe information security of the subject of the security activity, is in the protection of the interests of the security activity subject, connected with protection from unauthorized access to those data that are important in the work of the security activity subject. Critical data can be presented by a combination of information that is able to satisfy the owner's interest, and his actions aimed at mastering information or a screen of information. These data are protected against external and internal threats. In the case when the subject of the hunting activity does not see the need to protect its actions, for example, due to the fact that this does not pay off, the content of information security can be reduced to the protection of specific information, the disclosure of which may cause a noticeable loss of activity. Confidential for the subject of security activities information is in the sphere of increased interest of competing companies. For unscrupulous competitors, corrupt officials and other intruders, information about the composition of the organization's management, its status and activities is of particular interest. Such information usually refers to trade secrets. In some cases, also ensuring the kidnapping of 1/5 of confidential information can have a critical impact on financial security.http://sit.nuou.org.ua/article/view/157606automated systeminformation securityinformation security meansinformation security systemsecurity activity subject
spellingShingle Oleg O. Shkarlat
Roman M. Shtonda
Yulia A. Chernish
Maria M. Sulimovska
PROTECTION OF INFORMATION IN AUTOMATED SYSTEMS OF SECURITY ACTIVITY SUBJECTS
Sučasnì Informacìjnì Tehnologìï u Sferì Bezpeki ta Oboroni
automated system
information security
information security means
information security system
security activity subject
title PROTECTION OF INFORMATION IN AUTOMATED SYSTEMS OF SECURITY ACTIVITY SUBJECTS
title_full PROTECTION OF INFORMATION IN AUTOMATED SYSTEMS OF SECURITY ACTIVITY SUBJECTS
title_fullStr PROTECTION OF INFORMATION IN AUTOMATED SYSTEMS OF SECURITY ACTIVITY SUBJECTS
title_full_unstemmed PROTECTION OF INFORMATION IN AUTOMATED SYSTEMS OF SECURITY ACTIVITY SUBJECTS
title_short PROTECTION OF INFORMATION IN AUTOMATED SYSTEMS OF SECURITY ACTIVITY SUBJECTS
title_sort protection of information in automated systems of security activity subjects
topic automated system
information security
information security means
information security system
security activity subject
url http://sit.nuou.org.ua/article/view/157606
work_keys_str_mv AT olegoshkarlat protectionofinformationinautomatedsystemsofsecurityactivitysubjects
AT romanmshtonda protectionofinformationinautomatedsystemsofsecurityactivitysubjects
AT yuliaachernish protectionofinformationinautomatedsystemsofsecurityactivitysubjects
AT mariamsulimovska protectionofinformationinautomatedsystemsofsecurityactivitysubjects