PROTECTION OF INFORMATION IN AUTOMATED SYSTEMS OF SECURITY ACTIVITY SUBJECTS
The information security of the subject of the security activity, is in the protection of the interests of the security activity subject, connected with protection from unauthorized access to those data that are important in the work of the security activity subject. Critical data can be presented b...
Saved in:
| Main Authors: | , , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Національний університет оборони України
2018-08-01
|
| Series: | Sučasnì Informacìjnì Tehnologìï u Sferì Bezpeki ta Oboroni |
| Subjects: | |
| Online Access: | http://sit.nuou.org.ua/article/view/157606 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1849315594531241984 |
|---|---|
| author | Oleg O. Shkarlat Roman M. Shtonda Yulia A. Chernish Maria M. Sulimovska |
| author_facet | Oleg O. Shkarlat Roman M. Shtonda Yulia A. Chernish Maria M. Sulimovska |
| author_sort | Oleg O. Shkarlat |
| collection | DOAJ |
| description | The information security of the subject of the security activity, is in the protection of the interests of the security activity subject, connected with protection from unauthorized access to those data that are important in the work of the security activity subject. Critical data can be presented by a combination of information that is able to satisfy the owner's interest, and his actions aimed at mastering information or a screen of information. These data are protected against external and internal threats. In the case when the subject of the hunting activity does not see the need to protect its actions, for example, due to the fact that this does not pay off, the content of information security can be reduced to the protection of specific information, the disclosure of which may cause a noticeable loss of activity. Confidential for the subject of security activities information is in the sphere of increased interest of competing companies. For unscrupulous competitors, corrupt officials and other intruders, information about the composition of the organization's management, its status and activities is of particular interest. Such information usually refers to trade secrets. In some cases, also ensuring the kidnapping of 1/5 of confidential information can have a critical impact on financial security. |
| format | Article |
| id | doaj-art-4b4c4b4ade03414e92b167a4a530344a |
| institution | Kabale University |
| issn | 2311-7249 2410-7336 |
| language | English |
| publishDate | 2018-08-01 |
| publisher | Національний університет оборони України |
| record_format | Article |
| series | Sučasnì Informacìjnì Tehnologìï u Sferì Bezpeki ta Oboroni |
| spelling | doaj-art-4b4c4b4ade03414e92b167a4a530344a2025-08-20T03:52:06ZengНаціональний університет оборони УкраїниSučasnì Informacìjnì Tehnologìï u Sferì Bezpeki ta Oboroni2311-72492410-73362018-08-0102(32)1722157606PROTECTION OF INFORMATION IN AUTOMATED SYSTEMS OF SECURITY ACTIVITY SUBJECTSOleg O. Shkarlat0Roman M. Shtonda1Yulia A. Chernish2Maria M. Sulimovska3Association of Security Law Firms “Paladin”Military Institute of Telecommunications and Information named after Heroiv KrutMilitary Institute of Telecommunications and Information named after Heroiv KrutNational Defense University of Ukraine named after Ivan ChernyhovskiThe information security of the subject of the security activity, is in the protection of the interests of the security activity subject, connected with protection from unauthorized access to those data that are important in the work of the security activity subject. Critical data can be presented by a combination of information that is able to satisfy the owner's interest, and his actions aimed at mastering information or a screen of information. These data are protected against external and internal threats. In the case when the subject of the hunting activity does not see the need to protect its actions, for example, due to the fact that this does not pay off, the content of information security can be reduced to the protection of specific information, the disclosure of which may cause a noticeable loss of activity. Confidential for the subject of security activities information is in the sphere of increased interest of competing companies. For unscrupulous competitors, corrupt officials and other intruders, information about the composition of the organization's management, its status and activities is of particular interest. Such information usually refers to trade secrets. In some cases, also ensuring the kidnapping of 1/5 of confidential information can have a critical impact on financial security.http://sit.nuou.org.ua/article/view/157606automated systeminformation securityinformation security meansinformation security systemsecurity activity subject |
| spellingShingle | Oleg O. Shkarlat Roman M. Shtonda Yulia A. Chernish Maria M. Sulimovska PROTECTION OF INFORMATION IN AUTOMATED SYSTEMS OF SECURITY ACTIVITY SUBJECTS Sučasnì Informacìjnì Tehnologìï u Sferì Bezpeki ta Oboroni automated system information security information security means information security system security activity subject |
| title | PROTECTION OF INFORMATION IN AUTOMATED SYSTEMS OF SECURITY ACTIVITY SUBJECTS |
| title_full | PROTECTION OF INFORMATION IN AUTOMATED SYSTEMS OF SECURITY ACTIVITY SUBJECTS |
| title_fullStr | PROTECTION OF INFORMATION IN AUTOMATED SYSTEMS OF SECURITY ACTIVITY SUBJECTS |
| title_full_unstemmed | PROTECTION OF INFORMATION IN AUTOMATED SYSTEMS OF SECURITY ACTIVITY SUBJECTS |
| title_short | PROTECTION OF INFORMATION IN AUTOMATED SYSTEMS OF SECURITY ACTIVITY SUBJECTS |
| title_sort | protection of information in automated systems of security activity subjects |
| topic | automated system information security information security means information security system security activity subject |
| url | http://sit.nuou.org.ua/article/view/157606 |
| work_keys_str_mv | AT olegoshkarlat protectionofinformationinautomatedsystemsofsecurityactivitysubjects AT romanmshtonda protectionofinformationinautomatedsystemsofsecurityactivitysubjects AT yuliaachernish protectionofinformationinautomatedsystemsofsecurityactivitysubjects AT mariamsulimovska protectionofinformationinautomatedsystemsofsecurityactivitysubjects |