Analysis of the original data for the formation of information security policy at the enterprise
The article considers the factors that are to be analyzed in the process of information security policy formation at the enterprise as a whole and in each of its business processes in particular as well as the classification of information security threats (by the aspect of information security to w...
Saved in:
| Main Author: | І.Y. Makovskyi |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Zhytomyr Polytechnic State University
2020-03-01
|
| Series: | Економіка, управління та адміністрування |
| Subjects: | |
| Online Access: | http://ema.ztu.edu.ua/article/view/200772/200914 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Modeling of Ensuring Information Security of a Credit and Financial Facility
by: S. I. Koz’minykh
Published: (2018-11-01) -
Ethical leadership and employee information security policy (ISP) violation: exploring dual-mediation paths
by: Botong Xue, et al.
Published: (2021-10-01) -
Hybrid nature of modern threats for cybersecurity and information security
by: Oleksandr TSARUK, et al.
Published: (2020-03-01) -
Research on Safety Risks of Speech Information
by: H. V. Davydau, et al.
Published: (2022-11-01) -
Comprehensive security estimation of departmental networks
by: T. A. Andryianava, et al.
Published: (2019-06-01)