PROBLEMS OF COMPREHENSIVE PROTECTION OF INFORMATION AT PJSC "RESEARCH AND DESIGN-PROCESSING INSTITUTE OF THE ENAMELED CHEMICAL EQUIPMENT AND NEW TECHNOLOGIES KOLAN"

  • G. Golovko
  • M. Koltunov
  • A. Samofal
Keywords: protection, protection of information, information security, security of information

Abstract

The subject of research describes the peculiarities of the use of information security systems in the activities of PJSC "Research and Design-Processing Institute of the Enameled Chemical Equipment and New Technologies KOLAN". The essence of information security systems and the tasks that they can perform are defined. The aim is to take notice of comprehensive protection problems in enterprises. The following results are obtained. Information security performs four important for an organization which is protect the organization’s ability to function, enable the safe operation of applications implemented on the organization’s IT systems, protect the data the organization collect and uses, and lastly is safeguards the technology assets in use at the organization. Conclusions. The main components that form internal and external information security are defined. It is proved that the use of information security systems is an obligatory condition for the activity of a modern enterprise or production, which will help prevent the loss or theft of important sensitive information. Information security is crucial in organization. All information stored in the organization should be kept secure. Information security will be defined as the protection of data from any threats of virus. The information security in important in the organization because it can protect the confidential information, enables the organization function, also enables the safe operation of application implemented on the organization’s Information Technology system, and information is an important asset for an organization

Downloads

Download data is not yet available.

References

1. Sievierinov, O.V., Chernysh, V.I. and Molchanova, M.Y. (2011), “Information security management in accordance with international standards”, Control, navigation and communication systems, CSRI N&M, Kyiv, pp. 250-253.
2. International standard ISO/IEC 27002, available at: www.iso27000security.com.
3. The Law of Ukraine. The protection of information in information and telecommunication system, available at: http://zakon.rada.gov.ua/laws/show/.
4. The greatest and biggest attacks of computers viruses ever, available at: http://tass.ru/info/4248876.
Published
2018-07-03
How to Cite
Golovko G. Problems of comprehensive protection of information at pjsc "research and design-processing institute of the enameled chemical equipment and new technologies kolan" / G. Golovko, M. Koltunov, A. Samofal // Control, Navigation and Communication Systems. Academic Journal. – Poltava: PNTU, 2018. – VOL. 3 (49). – PP. 100-102. – doi:https://doi.org/10.26906/SUNZ.2018.3.100.

Most read articles by the same author(s)

1 2 > >>