ТЕОРЕТИЧНІ ТА МЕТОДИЧНІ ЗАСАДИ КІБЕРНЕТИЧНОЇ БЕЗПЕКИ ПІДПРИЄМСТВА
Main Authors: | Юзевич Володимир Миколайович, Юзевич Лариса Володимирівна, Крет Ігор Зиновійович |
---|---|
Format: | Article Journal |
Bahasa: | ukr |
Terbitan: |
, 2018
|
Subjects: | |
Online Access: |
https://zenodo.org/record/2634432 |
Daftar Isi:
- The article deals with the issues of cybernetic security in the system of economic security of the enterprise. The content-specific features of economic security of the enterprise are revealed. The essence of the concept of “cybernetic security” from the point of view of different views is found out. Characterized cybercrime, cyber-attacks and cyber-risks in the context of providing cybernetic security to the enterprise. The key aspects of cyber-insurance are presented. The purpose of the article is to study the conceptual foundations and practical aspects of the formation and maintenance of cybernetic security of the enterprise. The urgency of the study is due to the fact that the key aspect of ensuring the economic security of the enterprise is the protection of accounting information from various types of cybernetic risks. It is revealed that the characteristic features of cybernetic security are its components: 1) the peculiarities of cybernetic influence; 2) intelligence of information-telecommunication and cryptosystems of potential cyberattack carriers; 3) protection of its own information system. It is noted that one of the most successful methods of combating cybercrime is cyber-insurance. This kind of insurance provides a financial mechanism for the recovery of entities after the loss of activity and promotes the restoration of processes of normal functioning, provides stability and solvency, and also helps to reduce costs due to downtime in production processes. It has been established that the level of cybernetic security of an enterprise should be evaluated by such parameters as the level of information security; the level of skills of employees, the probability of defeat by cyber attacks, the level of cooperation with IT companies, the level of riskiness of the investment portfolio, the level of legality of the activity. The prospect of further research in this area is the formation of an enterprise information security management system.