To see the other types of publications on this topic, follow the link: Component of corporate security.

Journal articles on the topic 'Component of corporate security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Component of corporate security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Metodieva, Tsvetelina, and Iliana Simeonova. "MIGRATION SECURITY AS A COMPONENT OF CORPORATE SECURITY." Journal Scientific and Applied Research 27, no. 1 (2024): 163–69. http://dx.doi.org/10.46687/jsar.v27i1.416.

Full text
Abstract:
A new element has been added to the components of corporate security - migration security. The proposed new author's terms for our scientific community - "migration security" will facilitate future research in the field of the impact of migration processes on the security of regions and business organizations.
APA, Harvard, Vancouver, ISO, and other styles
2

A. Manakhova. "Corporate Security as a Component of Russia's National Security." International Affairs 66, no. 003 (2020): 146–52. http://dx.doi.org/10.21557/iaf.60072925.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Tulchynska, Svitlana, Olha Popelo, Rostislav Tulchinskiy, Oleksandr Popelo, and Tetiana Tkachenko. "Innovative Development as Determinant of Corporate Economic Security." Opportunities and Challenges in Sustainability 1, no. 1 (2022): 52–60. http://dx.doi.org/10.56578/ocs010106.

Full text
Abstract:
The current challenges of globalization provide business entities of various economic systems with multifaceted opportunities, while creating new threats to economic security. These and other challenges require enterprises to pay attention to innovation, and improve their economic security. The study substantiates the importance of innovative development as a determinant of corporate economic security. The main purpose is to assess the innovative development state of enterprises, and evaluate its impact on economic security based on the available information and analytical support. To achieve the set goal, the authors proposed an assessment approach for corporate economic security based on the innovative component, and developed a monitoring algorithm for the factors affecting corporate development. The systemic approach was employed to consider the innovative component as a subsystem of corporate economic security, and to measure its impact on corporate development. In this way, the innovative component of corporate economic security could be calculated comprehensively. The methodology takes account of the systemic approach, as well as methodical support for the analysis of components, which is based on rating evaluations, systematic expert evaluations, and ranking scales. Industrial enterprises that pay special attention to innovative development were selected to test the proposed methodical support. In addition, the Harrington scale was adapted to establish the level of corporate economic security. Based on the calculations, it was determined that the studied enterprises have an average and below average level of economic security due to component innovation. Overall, this research presents a suitable algorithm for assessing the level of corporate economic security.
APA, Harvard, Vancouver, ISO, and other styles
4

Volosnikova, N. M. "The Methodical Principles of Controlling the Information System of Corporate Security." Business Inform 5, no. 520 (2021): 141–46. http://dx.doi.org/10.32983/2222-4459-2021-5-141-146.

Full text
Abstract:
The article is aimed at determining the consequences of the influence of the information component as a significant factor directed towards improving the economic efficiency of the corporate security system. The structure of controlling of the corporate security information system is characterized as a system of interacting components for determining the goals of strategic, tactical and operational management of the corporate security system, organization of the planned actions, regulation, control, analysis and monitoring. The general appearance of the key stages of the genesis of controlling of the corporate security information system is specified. It is concluded that thanks to the functioning of the management of the corporate security system, the fulfillment of the goal of the organization of a certain level is achieved. A variety of definitions of the concept of «controlling» is substantiated, which gives reason to take into account the controlling of the information system of corporate security as a philosophy or conception of managing the corporate security system, by which it is necessary to understand a set of opinions on determining the goals of strategic, tactical and operational management of the corporate security system, its organization and related instrumentarium. In addition, when solving an applied task, the situation of influence of the institutional environment on the system of corporate security in enterprises can be described using functional dependence. It is noted that the system of management of controlling has incoming strategic goals of the corporate security information system. The conception of corporate security information system together with strategic goals of the corporate security system itself are presented. At each level of the hierarchy of management, the controlling of the corporate security information system has a specific purpose. In this regard, there is an urgent need for further scientific and theoretical comprehension of the strategic aspects of corporate security.
APA, Harvard, Vancouver, ISO, and other styles
5

Wang, Weiye. "Research on High-Quality Development of Corporate Pensions from a Multi-Pillar Pension Perspective." SHS Web of Conferences 190 (2024): 02010. http://dx.doi.org/10.1051/shsconf/202419002010.

Full text
Abstract:
The corporate pension system is an integral component of the multi-pillar retirement framework. It is a retirement security system jointly participated in by employers and employees and represents a collective form of employee personal accounts and corporate funds. As China’s aging process accelerates and pension security issues become more pronounced, the corporate pension system has gradually become one of the commonly adopted retirement security systems both domestically and internationally. However, the corporate pension system in China still faces many issues and challenges. These include low employee participation rates, non-uniform regulatory standards, suboptimal investment returns, personal account security risks, and the balancing of interests among different stakeholders.
APA, Harvard, Vancouver, ISO, and other styles
6

Hu, Yiluo. "The Impact of Social Security Fund Investment on Corporate ESG Performance." Advances in Economics, Management and Political Sciences 171, no. 1 (2025): 32–41. https://doi.org/10.54254/2754-1169/2025.21846.

Full text
Abstract:
As an important component of the capital market, the investment behavior of social security funds has increasingly drawn attention for its impact on corporate ESG performance. Based on data from publicly listed companies in China, this paper explores the influence of social security fund investment with respect to corporate ESG performance and its core mechanisms. The study finds that social security fund investment effectively enhances corporate ESG integration. Heterogeneity tests show that the relationship between the two varies across aspects such as auditor quality, information transparency, and analyst attention. This paper provides policy insights for optimizing social security fund investment strategies and enhancing corporate sustainability.
APA, Harvard, Vancouver, ISO, and other styles
7

Valiullina, Z. V. "Information security of corporate economics in the conditions of globalization." Bulletin of the Dnipropetrovsk University. Series: Management of Innovations, no. 6 (February 15, 2016): 34–43. https://doi.org/10.15421/191604.

Full text
Abstract:
In modern conditions of the 21<sup>st</sup> century, information security of corporate economics is gaining more importance while the task of its provision becomes more and more acute. Rapid introduction of information technologies into all spheres of vital activities of the society and the development of corporate economy under conditions of globalization processes call for the definition of substantiated and efficient ways of ensuring information security. The purpose of writing this article is theoretical–methodological analysis and identification of the basic components of provision of information security of the corporate economy under conditions of globalization to protect information, directions of improving the efficiency and competitiveness of the economy on the world market. In the course of the study we applied the following methods: systematic and comparative analysis, the method of generalization. The paper considers theoretical–methodological fundamentals of information security of the corporate economy. The results of the comparative analysis of the category of "information security" were systemized and are given here. Information security is proposed to be regarded as an integrated component of the process of ensuring the protection of information from internal and external threats and creating favorable conditions for the efficient functioning of corporations and enhancing their competitiveness. Peculiarities of setting up an efficient system of information security were researched. A solution to the problem of efficient functioning of the system of information security of corporate economics in the conditions of globalization was proposed by adopting a set of measures that take into account the main components of information security: legislative; economic; program–technical; administrative management. The scientific novelty of the research lies in the improvement of scientific and methodical approach to identifying components of information security of the corporate economy, which provide a range of political, economic, organizational, technical and other measures that contribute to the realization of informational rights and interests of corporations. The practical significance of obtained results is to provide protection of the information of corporations from internal and external threats, creating favorable conditions for the efficient functioning of corporations and enhancing their competitiveness. The design of measures to ensure the interaction between institutional environment is a promising topic of the further research into the corporate economy based on parity of information security.
APA, Harvard, Vancouver, ISO, and other styles
8

Volosnikova, Nataliia. "RESEARCH OF SUSTAINABILITY OF THE GENERAL CORPORATE SECURITY SYSTEM." Bulletin of the National Technical University "Kharkiv Polytechnic Institute" (economic sciences), no. 1 (February 15, 2021): 41–47. http://dx.doi.org/10.20998/2519-4461.2021.1.41.

Full text
Abstract:
The purpose of the article is to determine the mechanism of functioning and increase the stability of the general system of corporate security. Thiscreates an abstract and conceptual model of the corporate security system, which is described mathematically or functionally and serves to optimize therelationship between the elements and levels of consequences of the information component, as a significant factor aimed at improving the economicefficiency of the corporate security system. The structure of the system is distinguished as a set of closed elements that are connected to the system bycertain connections and are interdependent. The system of corporate security from the point of view of reliability is analyzed. It is concluded that themost common reason for the violation of the integrity of the overall corporate security system is the loss of stability. System resilience is seen as theability of a system to function properly and withstand the various inevitable effects of phenomena in the micro- and macroeconomic environment. Thereare three types of crises depending on the mechanisms of development and the nature of the stability of the overall corporate security system, namelythe critical situation of the corporate security system, the crisis, disasters. Quantitative characteristics of indicators of reliability of the general systemof corporate security are offered.
APA, Harvard, Vancouver, ISO, and other styles
9

Kubale, Valentina, Teja Lobnikar, Branko Gabrovec, and Miha Dvojmoč. "Ensuring Corporate Security and Its Strategic Communication in Healthcare Institutions in Slovenia." Healthcare 11, no. 11 (2023): 1578. http://dx.doi.org/10.3390/healthcare11111578.

Full text
Abstract:
Ensuring corporate security is an essential and critical component of any healthcare facility to provide safe services to its patients and employees. Healthcare facilities must employ a variety of strategies to ensure corporate security. This includes developing a comprehensive communication plan that defines the roles and responsibilities of the various stakeholders. The objective of our study was to present the concept of corporate security in healthcare institutions and in the Slovenian healthcare system, to highlight current threats in healthcare institutions in Slovenia, to describe the importance of strategic communication of corporate security in healthcare, and finally to define the current state of corporate security in Slovenian healthcare institutions in Slovenia. A survey was conducted and distributed to healthcare institutions in Slovenia to obtain results. A total of 154 healthcare stakeholders participated in our study. The results showed that corporate security is present in Slovenian healthcare facilities, but additional efforts are needed to improve it, especially considering the current challenges related to the measures taken after the COVID-19 epidemic and the shortage of healthcare personnel. The legal processes of corporate security in healthcare facilities comply with applicable laws and regulations to protect the interests of their patients and employees. Operational security processes are currently provided primarily by internal providers. There is a need for improvement, particularly in the training and education of staff, who play the most important role in ensuring safety. To effectively establish comprehensive corporate security, strategic communication with all stakeholders is essential to ensure that their security policies and procedures are properly implemented.
APA, Harvard, Vancouver, ISO, and other styles
10

Podroiko, Ye V., and Yu M. Lysetskyi. "Network technologies: evolution and peculiarities. Mathematical machines and systems." Mathematical machines and systems 2 (2020): 14–29. http://dx.doi.org/10.34121/1028-9763-2020-2-14-29.

Full text
Abstract:
Today corporate network is seen as a complex system and traditionally provides the set of interacting essential components, such as: Main Site – a network of head office; Remote Site (Branch) – networks of remote office; WAN – global network uniting networks of the offices; LAN – a local network; WAN Edge – a point of connection to WAN. Internet Edge – a point of connection to the Internet; Data Cen-ter – corporate centre of data processing. Some sources also regard Service Block as a component, which is a separate segment of the network with specific services. Every component of corporate network fea-tures contains individual set of technologies, each having its history of origination and development. The paper offers short review of basic technologies which form the history of development of corporate network, as well as their evolution from a set of separated network technologies to a unified multi-service network infrastructure. This unified infrastructure is inextricably linked with a global network of Internet which is both a service and a carrier for majority of modern corporate networks. The paper de-scribes origination and development of Internet, local and global networks, Wi-Fi networks and software defined networks. Corporate network has been through a long evolution from co-existence of separated technologies to modern unified intellectual network infrastructure with high security and reliable man-agement. Due to fast-moving development of information technologies the corporate networks have dynamically transformed in several directions: network functions virtualization (NFV – Network Func-tions Virtualization); utilization of SDN solutions; automation of management processes; analytics; se-curity; cloud services. In the course of such a transformation the corporate network turned into unified, flexible, application oriented infrastructure with high reliability, easily modified and expanded function-ality, single management center, unified security policies, fast and detailed analysis of internal network processes.
APA, Harvard, Vancouver, ISO, and other styles
11

Taramov, Alu A., Aidar I. Vagapov, and Ilyas A. Dzhabrailov. "APPLICATION OF COMPUTER SECURITY TECHNOLOGIES IN CORPORATE E-COMMERCE." EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 11/14, no. 152 (2024): 72–76. https://doi.org/10.36871/ek.up.p.r.2024.11.14.008.

Full text
Abstract:
In the modern development of the economy, e-commerce has become an important component under the influence of electronic information technologies and the Internet. Moreover, consumption through online platforms has become a relatively common method of consumption among the country’s citizens. Due to the strong information interactivity, pricing, warehousing and other advantages that are gradually emerging, e-commerce plays an important role in meeting current social consumption. It was with the rapid development of e-commerce that a series of technical computer security problems followed one after another. How to ensure computer security technology in the development of a fast, efficient and secure e-commerce model has become an urgent problem. This article examines the state of e-commerce development and, by studying and analyzing the main technical security risks that exist in e-commerce, he will further carry out a comprehensive and effective optimization development in order to better contribute.
APA, Harvard, Vancouver, ISO, and other styles
12

Mihus, I., L. Akimova, О. Akimov, S. Laptev, O. Zakharov, and N. Gaman. "INFLUENCE OF CORPORATE GOVERNANCE RATINGS ON ASSESSMENT OF NON-FINANCIAL THREATS TO ECONOMIC SECURITY OF JOINT STOCK COMPANIES." Financial and credit activity problems of theory and practice 6, no. 41 (2022): 223–37. http://dx.doi.org/10.18371/fcaptp.v6i41.251442.

Full text
Abstract:
Abstract. In modern conditions of transformation and globalization of economic processes, rapid development of information and science-intensive technologies, each company seeks to ensure effective management of its activities and achieve a higher level of competitiveness. The level of quality of corporate governance influences the formation of the rating of enterprises and plays an important role in making decisions about investing in the company. At the same time, ensuring financial security is the most urgent task of society, the state, enterprises and organizations of all forms of ownership, entrepreneurs, and every citizen. In this regard, the practical implementation of recommendations to maintain financial security at the appropriate level will contribute to the completion of market transformations in the financial and credit sphere of the country, increase the level of financial security of enterprises, increase human security. It is corporate-type enterprises, namely joint-stock companies and limited liability companies, that are the main types of business structures that ensure the development of a market economy. Therefore, it is advisable to pay attention to the features of ensuring and assessing the quality of corporate governance of enterprises aimed at implementing the model of long-term sustainable development. The purpose of the article is to establish the impact of corporate governance ratings on the assessment of non-financial threats to the economic security of joint stock companies. In the article In the article the systematization of corporate governance indicators by criteria is carried out; the main components of the S&amp;P corporate governance rating methodology, the CORE rating, the main components of the RID-Expert RA corporate governance rating methodology, the main components of the corporate governance methodology of the Crichton-Miller and Warman methodology, the main components of the Corporate Governance rating rating Credit Rating Agency; the advantages and disadvantages of methods of compiling corporate governance ratings are highlighted. Keywords: rating, corporate governance, economic security, joint-stock company, threats, assessment. JEL Classification E44, G30, K22 Formulas: 2; fig.: 5; tabl.: 0; bibl.: 36.
APA, Harvard, Vancouver, ISO, and other styles
13

Kapiton, A., О. Dziuban, R. Baranenko, and H. Sokol. "SECURITY OF INFORMATION TECHNOLOGIES IN A HYBRID WORKING ENVIRONMENT." Системи управління, навігації та зв’язку. Збірник наукових праць 3, no. 77 (2024): 126–29. http://dx.doi.org/10.26906/sunz.2024.3.126.

Full text
Abstract:
The article discusses the main aspects of information technology security in a hybrid working environment. With the rapid rise in popularity of remote work, traditional workplace security standards have been proven to be inadequate, creating a real need for effective cyber security measures. remote work has become the norm for many companies, but with it the threat of cyberattacks has also increased. Features and risks associated with the organization of a hybrid work environment caused by remote employment are considered, as well as methods of ensuring safety in such a work environment are investigated. The main problems that arise and need to be prevented have been identified. It has been proven that one of the key areas is to securely connect to corporate networks from remote locations. It has been established that traditional VPN methods can be ineffective or insufficiently secure in conditions of large-scale use, so it is necessary to use modern means of traffic encryption and authentication mechanisms, which aim to organize the protection of access to corporate resources. The article examines the content of the constituent components that are responsible for the security of the endpoint. Requirements are defined that allow access to update and modify the software and operating systems of remote devices, which is a special parts of the proposed strategy that meets data security for operation in a hybrid environment. The determining motives of the implementation of the main structural component mechanisms of data access control and the possibility of remote shutdown of devices in the event of emotional actions have been studied. data protection plays a crucial role in remote work. The indisputability of the need to design and implement a system for protecting all remote resources, means of recognizing and identifying suspicious messages and links, as well as the use of reliable passwords and two-factor authentication has been proven and substantiated.
APA, Harvard, Vancouver, ISO, and other styles
14

Середа, Олена Олександрівна. "ОЦІНЮВАННЯ ФІНАНСОВОЇ БЕЗПЕКИ КОРПОРАТИВНИХ ПІДПРИЄМСТВ В УМОВАХ ЦИФРОВОЇ ЕКОНОМІКИ". TIME DESCRIPTION OF ECONOMIC REFORMS, № 2 (24 червня 2025): 105–12. https://doi.org/10.32620/cher.2025.2.12.

Full text
Abstract:
Financial security is a key prerequisite for the stable development of corporate enterprises, which necessitates the improvement of methodological approaches to its assessment, taking into account the dynamics of external and internal factors, as well as transformations of the business environment in the digital economy. The purpose of the article is to form a comprehensive approach to assessing the financial security of corporate enterprises, based on a combination of financial, managerial and digital factors, to identify the level of protection of the corporate structure from internal and external threats and ensure its sustainable development. The subject of the research is the process of forming, assessing and ensuring the financial security of corporate enterprises, taking into account the impact of digitalization of the economic environment. The methods of the research: system analysis to reveal the essence of financial security; classification and grouping methods to determine key components and indicators; expert assessments to establish weighting factors and assess qualitative parameters; modeling to form an integral indicator for assessing the financial security of corporate enterprises in the digital economy. The statement of basic materials. The article highlights modern approaches to determining the essence of financial security of corporate enterprises. A sequence of comprehensive assessment of the level of financial security is proposed, which takes into account financial stability, management efficiency and digital adaptation. A classification of key risks and threats to financial security is carried out, taking into account internal and external factors, and a system of indicators for quantitative and qualitative assessment of financial security of corporate enterprises is developed. Special attention is paid to the formation of an integral indicator that allows for an objective and comprehensive assessment of financial security in the digital economy. The practical significance of the results obtained lies in the formation of a toolkit for a comprehensive assessment of financial security of corporate enterprises in the digital economy. The proposed methodological approach will allow corporate enterprises to identify potential risks and threats in a timely manner, which contributes to making informed management decisions to strengthen financial stability and increase the adaptability of enterprises in the digital economy. Conclusions and perspectives of further research. The scientific approaches to the concept of financial security of enterprises are analyzed, among which systemic, functional-dynamic, managerial, risk-oriented and digital are distinguished. The theoretical basis for assessing the financial security of corporate enterprises in the digital economy is substantiated. A methodological approach to assessing the financial security of a corporate enterprise is proposed, which takes into account the peculiarities of corporate structures, the impact of digital transformations and the integration of financial, managerial and digital components for a comprehensive assessment of the level of security.
APA, Harvard, Vancouver, ISO, and other styles
15

Volosnikova, N. M. "Features of a System Approach to the Strategy of the Corporate Security System of Industrial Enterprise." Business Inform 6, no. 521 (2021): 276–82. http://dx.doi.org/10.32983/2222-4459-2021-6-276-282.

Full text
Abstract:
The article is aimed at examining the peculiarity of a system approach to the strategy of the corporate security system of an industrial enterprise as a significant factor directed towards increasing the economic efficiency of the general system. The peculiarity of the system approach to the strategy of corporate security system is examined and the main stages of its (approach) development are disclosed. It is noted that a system approach can be called the approach, in the presence of which management decisions directed towards the competitive direction of strategic development of corporate security are considered in the form of an interrelated and interdependent holistic complex. The goals of the corporate security strategy of the industrial enterprise, which should be subordinated to the general strategy of economic development, and the implementation of the management strategy for the formation of general corporate security, carried out through decision-making, are substantiated. It is concluded that the mechanism of management of the corporate security system must be realized as an integral organizational and economic system, which is an integral part in the overall structure of the mechanism of an industrial enterprise. The main tasks and components of the general corporate security strategy model are identified. In addition, it is noted that the mechanism should be understood as a sequence of measures that are caused by a set of interdependent elements of economic, logistical, personnel, legal, resource, transactional, informational, technological security that form the state and content of processes in accordance with the defined corporate security strategy.
APA, Harvard, Vancouver, ISO, and other styles
16

Fadeikina, N. V., G. A. Fadeikin, and O. V. Morozova. "On the modernization of the information security mechanism in the credit and financial sphere in order to achieve the economic security of the state." Siberian Financial School, no. 2 (July 6, 2025): 124–35. https://doi.org/10.34020/1993-4386-2025-2-124-135.

Full text
Abstract:
The article defines the essence of information security in the credit and financial sector as an essential component of the economic security of the state based on a variety of definitions of the concepts of "information security", "information security of the credit and financial sector" and "economic security", formulated by different researchers taking into account different points of view. Special attention is paid to new regulatory documents regulating the security of the critical information infrastructure of the Russian Federation, ensuring the information security of the KFS, improving the operational risk management system and comprehensive modernization of corporate risk management systems in KFS organizations, taking into account the new conditions for ensuring the information security of the KFS, which significantly affects the economic security of the state.
APA, Harvard, Vancouver, ISO, and other styles
17

Kharlamov, A. V., and E. D. Tershukov. "Ensuring the Economic Security of Economic Entities Through the Development of the Corporate Business Environment." Economics and Management 27, no. 7 (2021): 530–36. http://dx.doi.org/10.35854/1998-1627-2021-7-530-536.

Full text
Abstract:
Aim. The presented study aims to examine conceptual provisions for the formation and development of the corporate business environment to substantiate its increasing impact on the tools and methods used in solving management problems associated with ensuring the economic security of economic entities.Tasks. The authors determine the relationship and mutual influence between the corporate business environment and the management process aimed at ensuring economic security; identify the most significant components of the corporate business environment, focusing on corporate culture and commercial confidentiality; characterize the directions of government influence on the improvement of the corporate business environment to enhance the economic security and competitiveness of domestic economic entities in the national and global markets.Methods. This study analyzes scientific approaches to understanding the essence and content of the corporate business environment as well as its impact on the economic security of economic entities. The results of the analysis indicate the increasing influence of economic security on the engagement of economic entities in the formation of an effective corporate business environment.Results. The authors propose to modify the process of ensuring a high level of economic security so as to reflect the integrated interests of a wide range of economic entities related to each other both directly and indirectly. They also determine directions for the government’s stimulating influence on the improvement of the corporate business environment and the economic security of economic entities.Conclusions. The conducted study of economic security and the corporate business environment indicates a stable, direct, and inverse relationship between them. This makes it possible to formulate conceptual proposals for improving management in the field of the development of economic entities and increasing their efficiency based on economic security.
APA, Harvard, Vancouver, ISO, and other styles
18

Krylov, Alexander. "Information policy of state corporations." Social'naja politika i social'noe partnerstvo (Social Policy and Social Partnership), no. 6 (June 1, 2020): 83–87. http://dx.doi.org/10.33920/pol-01-2006-10.

Full text
Abstract:
This article discusses the general principles of the implementation of the information policy and the particular principles on the basis of which the information policy is implemented in PJSC FGC UES. The authors also studied corporate policy objectives and highlighted information security as a component of the information policy.
APA, Harvard, Vancouver, ISO, and other styles
19

Fadeikina, N. V., and V. S. Zyryanov. "Information and economic security of a credit institution as factors of ensuring its sustainable development." Siberian Financial School, no. 2 (August 26, 2024): 50–60. http://dx.doi.org/10.34020/1993-4386-2024-2-50-60.

Full text
Abstract:
The article defines the essence of information security as an essential component of the economic security of a credit institution on the basis of many definitions of the concepts of "information security" and "economic security" formulated by different researchers taking into account different points of view. Special attention is paid to new regulatory documents regulating the security of the critical information infrastructure of the Russian Federation, ensuring the information security of the credit and financial sector, improving the operational risk management system and comprehensive modernization of corporate risk management systems in credit institutions, taking into account the new conditions for ensuring information security and the functioning of the economic security system, on the effective functioning of which the ability to a credit institution's commitment to sustainable development.
APA, Harvard, Vancouver, ISO, and other styles
20

Franko, Oleksandr. "Definition for the effectiveness of corporate control in integration associations of joint-stock companies based on economic security." Ukrainian Journal of Applied Economics and Technology 2024, no. 3 (2024): 215–19. http://dx.doi.org/10.36887/2415-8453-2024-3-37.

Full text
Abstract:
This article aims to analyze and develop organizational and methodological tools to enhance the effectiveness of corporate control in integration associations of joint-stock companies based on ensuring economic security. Research methods include a comprehensive analysis of literary sources, theoretical modeling of corporate control structures, comparative analysis of existing practices, and developing methodological recommendations based on a systemic approach. Critical issues in corporate control of integration associations have been identified, and organizational and methodological support have been developed, which includes organizational, methodical, informational, legal, financial, and control components to enhance the effectiveness of corporate control. The scientific novelty lies in the development of the author’s definition of “organizational and methodological support for the effectiveness of corporate control in integration associations of joint-stock companies based on economic security” as a comprehensive system of managerial and methodological measures aimed at creating, implementing, and supporting an effective corporate control structure in integration associations of joint-stock companies. It also involves building a conceptual scheme for implementing organizational and methodological support for the effectiveness of corporate control in these associations based on economic security, which includes components of organizational and methodological support, methods of implementation, and expected outcomes. The practical significance of the research lies in developing approaches and recommendations that joint-stock companies can use to optimize corporate governance, enhance transparency, and reduce risks within the framework of economic security. Prospects for further research include expanding the study to an international level to analyze integration associations under various legal and cultural conditions, as well as the introduction of innovative technologies in corporate control to enhance its effectiveness. Keywords: corporate control, economic security, integration associations, joint-stock companies, organizational and methodological support, corporate management.
APA, Harvard, Vancouver, ISO, and other styles
21

Ribeiro Ramos, О., Ye Myronenko, I. Britchenko, O. Zhuk, and V. Patlachuk. "ECONOMIC SECURITY AS AN ELEMENT OF CORPORATE MANAGEMENT." Financial and credit activity problems of theory and practice 1, no. 42 (2022): 304–12. http://dx.doi.org/10.55643/fcaptp.1.42.2022.3698.

Full text
Abstract:
Abstract. The purpose of this study is to develop mechanisms to ensure the economic security of enterprises on the basis of identifying qualitative new patterns of its development, which are associated with digital transformation. The work uses methods of generalization, comparison, analysis and synthesis — to understand the essence and components of economic security; a graphic method — to visualize the conceptual model and mechanism for ensuring the economic security of the enterprise in conditions of digitalization; monographic methods — for in-depth research of the tasks set; abstract-logical methods for theoretical generalization of research results and formulation of conclusions and proposals. The mechanism for ensuring the economic security of enterprises on the basis of identifying qualitative new patterns of its development, the action of which allows to ensure the necessary level of economic security of the enterprise is suggested. The practical significance of the research lies in the development of methods for assessing the economic security of enterprises based on the calculation of relevant local indicators and a set of indicators that characterize various aspects of economic security (production, human resources, finance, environment, digitalization), which allows to develop timely measures to improve economic security in relevant areas. The originality lies in the justification of the structure of the functional components of the economic security of the enterprise and the justification of the need to calculate its level on the basis of the integral index in order to develop measures to improve it. The results of the study can be used for the formation of an effective system of economic security of the enterprise. Keywords: security, economic security, management, mechanism, enterprise, system, indicators of economic security. JEL Classification D02, M21 Formulas: 3; fig.: 2; tabl.: 3; bibl.: 17.
APA, Harvard, Vancouver, ISO, and other styles
22

Nasrullayev, Ravan, Vasyl Zelenyak, and Vladyslav Shakun. "Organizational and personnel mechanism of enterprise economic security." Actual problems of innovative economy and law 2024, no. 5 (2024): 93–97. https://doi.org/10.36887/2524-0455-2024-5-18.

Full text
Abstract:
The article considers the theoretical and methodological foundations of the organizational and personnel mechanism of economic security for enterprises, which is considered an important element in ensuring the stable functioning of a company in the face of external and internal threats. The purpose of the research is to systematize existing approaches and improve the theoretical and methodological support for the economic security of enterprises in terms of the personnel component. Based on the analysis of contemporary scientific approaches to economic security issues, emphasis is placed on the personnel component, which is a key factor in effective personnel management and protecting the enterprise from risks. The research substantiates the need to develop a personnel security system in conditions of increased competition and an unstable economic situation. Its key aspects are presented, such as human resource management, professional development of employees, increasing their qualifications, and the development of an effective motivation system. It is revealed that personnel security directly influences the economic sustainability and competitiveness of the enterprise, protecting against external environmental threats. The main components of ensuring personnel security for the enterprise are identified: organizational structure, personnel management system, motivation and stimulation, information security, internal control and audit system, regulatory and legal support, risk management, and continuous learning and qualification improvement of employees. The study justifies the main principles of personnel security, including compliance, threat prevention, comprehensiveness, legality, confidentiality, and flexibility. Special attention is paid to the risk management system, monitoring of personnel threats, and the development of corporate culture. The proposed organizational and personnel mechanism is a novel approach to ensuring economic security, effectively using resources, and increasing the enterprise’s competitiveness in modern conditions. Unlike existing ones, they are based on the principles and goals of personnel security. The practical value of the mechanism lies in its focus on human capital; it encompasses all stages of personnel work, namely selection, development, and motivation of personnel, ensuring information security and legal protection for employees. Keywords: economic security of enterprises, personnel component, personnel security of enterprises, personnel management, enterprise protection, personnel risks.
APA, Harvard, Vancouver, ISO, and other styles
23

Krasnyak, Olena, and Viktor Harbar. "Personnel security in the personnel management system as a component of the economic security of enterprises." Market Relations Development in Ukraine 115, no. 9(280) (2024): 84–92. https://doi.org/10.5281/zenodo.14039297.

Full text
Abstract:
The subject of the study is the process of forming the personnel security management system ofthe enterprise, which combines the selection and training of personnel, adaptation, career growth, etc.The purpose of the study is to clarify the theoretical and methodological aspects of the formationof the personnel security management system of the enterprise and to substantiate the directions ofpersonnel control at the enterprise.Research methods. The following methods were used in the work: systematization, comparisonand generalization of data, induction and deduction, graphic method.Work results. The article substantiates the relevance of ensuring personnel security of enterprises,considers the main approaches to its definition. External, internal and hidden factors of threats topersonnel security in the system of economic security of the enterprise have been established: availability of attractive working conditions at competitors; seduction of the best employees by competitors;pressure on employees; employees falling into various types of addiction; ineffective organization of thepersonnel management system; errors in planning and personnel selection, inconsistency of employeequalifications according to positions, low motivation system, lack of high corporate culture; dishonestperformance by staff of their own job duties and low criteria for personnel selection.Field of application. The results of the study can be used in the practical activities of modernenterprises to increase the efficiency of the personnel security management system of the enterprise.Conclusions. The results of the conducted research make it possible to assert that an effectivehuman resources management system should be created at the enterprise, which combines theselection and training of personnel, adaptation, career growth, etc. Managers of enterprises mustcarry out comprehensive work on ensuring the personnel component of the enterprise's economicsecurity, which is carried out in three stages: at the first stage, a thorough check of candidates is carriedout during recruitment; at the second stage &ndash; measures regarding the employee's performance of hisproduction activities; at the third stage &ndash; clarification of the reasons for the dismissal of workers andtheir intentions for the future.
APA, Harvard, Vancouver, ISO, and other styles
24

Manoilenko, Oleksandr V., Nataliia M. Volosnikova, and Natalia B. Reshetnyak. "The Complex System of Simulation Modeling of Assessment of the Efficiency of Financial Resource Management of an Industrial Enterprise at the Microeconomic Level." Business Inform 9, no. 536 (2022): 27–33. http://dx.doi.org/10.32983/2222-4459-2022-9-27-33.

Full text
Abstract:
The purpose of the article is to examine the features of a systematic approach to the total aggregate of methods for assessing the efficiency of resource management of an industrial enterprise, which methods can be divided into threshold and non-threshold, parametric and non-parametric ones. The peculiarity of a systematic approach to the corporate security system is studied and the main stages of this approach are identified. It is specified that a systematic approach is such one in the presence of which managerial decisions aimed at a competitive direction of strategic development of corporate security be considered in the form of an interconnected and interdependent integral complex. The objectives of the corporate security strategy of an industrial enterprise are substantiated, which should be subordinated to the general strategy of economic development, and the implementation of the management of the strategy for the formation of general corporate security, carried out through decision-making. It is concluded that the mechanism of management of the corporate security system must be represented as an integral organizational-economic system, which is also an integral part in the overall structure of the mechanism of an industrial enterprise. The main tasks and components of the model of the strategy of general corporate security are identified. In addition, it is noted that mechanism should be understood as a sequence of measures that are caused by an aggregate of interdependent elements of economic, logistics, personnel, legal, resource, transactional, information, technological security, forming the state and content of processes in accordance with a certain corporate security strategy.
APA, Harvard, Vancouver, ISO, and other styles
25

Liyanaarachchi, Gajendra. "Online privacy as an integral component of strategy: allaying customer fears and building loyalty." Journal of Business Strategy 41, no. 5 (2020): 47–56. http://dx.doi.org/10.1108/jbs-09-2019-0183.

Full text
Abstract:
Purpose This paper aims to demonstrate how building competency in privacy can be used to transform the corporate strategy to generate a sustainable competitive advantage. A novel framework is presented as a guide to redesigning strategy by striking a balance between customer expectation and organizational objectives. In doing so, the paper offers four possible outcomes of accommodation, accumulation, association and affiliation, providing illustrations to each scenario for strategy formulation. Design/methodology/approach The relationship between privacy paradox and corporate strategy was examined through a qualitative research study. The author conducted 30 in-depth interviews on grounded theory methodology investigating customer insights on the nature and extent of privacy protection associated with e-commerce and organizational approach. Findings The customers are dissatisfied with existing data security strategies adopted by firms in protecting privacy. The over-reliance on systems has negatively influenced the communication between the organization and customers, leading to a possible competitive disadvantage. The firms need to redesign privacy strategy shifting from a system-driven approach to providing personalized service. Originality/value This paper presents a novel framework the privacy strategy matrix (PSM), introducing privacy as a strategic expedient in transforming corporate strategy facilitating privacy protection as a metaphor for differentiation. PSM framework provides a standard to evaluate the effectiveness of the corporate strategy in managing privacy manifesting a path toward deriving a sustainable competitive advantage.
APA, Harvard, Vancouver, ISO, and other styles
26

Jansen van Vuuren, Joey, Marthie Grobler, and Jannie Zaaiman. "Cyber Security Awareness as Critical Driver to National Security." International Journal of Cyber Warfare and Terrorism 2, no. 1 (2012): 27–38. http://dx.doi.org/10.4018/ijcwt.2012010103.

Full text
Abstract:
In South Africa, cybersecurity has been identified as a critical component contributing to National Security. More rural communities are becoming integrated into the global village due to increased hardware and software corporate donations, the proliferation of mobile Internet devices and government programmes aimed at bridging the digital divide through major broadband expansion projects. The authors’ research shows that many of the new Internet users are not aptly trained to protect themselves against online threats, leaving them vulnerable to online exploits and inherently exposing the national system to potential international cyber attacks. This article works toward the identification of any correlation between the economic development and mobile use propensity of Internet users with regard to National Security. Internet penetration statistics are used in correlation with the economic development and exposure to technological advances of South Africans to classify participants in the surveys used into three groups: urban netizens, semi-rural netizens and rural netizens. South African citizens from areas within the Gauteng, Limpopo and Mpumalanga provinces participated in this study. Separate from these criteria, the availability of and access to the Internet via mobile phones is also taken into consideration. The article uses the results from the surveys to identify direct and indirect links between the factors in question.
APA, Harvard, Vancouver, ISO, and other styles
27

Batiuk, Oleg, and Leonid Danylivskyi. "Ensuring the security of critical infrastructure facilities as a component of national security: National and international experience." Society and Security, no. 6(6) (January 15, 2025): 83–89. https://doi.org/10.26642/sas-2024-6(6)-83-89.

Full text
Abstract:
In the provisions of the scientific article, the authors using general scientific methods conduct a study of scientific views, normative and legal regulation of national and international fundamental principles of ensuring the security of critical infrastructure facilities as a component of national security. The authors substantiate the proposals for amendments to the current legislation of Ukraine and subordinate regulations in terms of development and implementation of the following elements at a CI facility: document security in the form of the Provision on Handling Restricted Information; personnel security in the form of the Instruction on Personnel Security when Accessing Restricted Information and Physical Impact on the Personnel of a Critical Infrastructure Facility; physical security in the form of the Guidelines for Developing a Restricted Area Protection Plan or the Instruction for Establishing Restricted Areas at a Critical Infrastructure Facility; security of information and communication systems in the form of the Instruction for Accreditation of Information and Communication Systems for Processing Restricted Information. The authors note that in order to ensure proper quality for the implementation of comprehensive security measures, the CI operator has the right to choose the security measures to be implemented, for example, on the basis of internationally recognised security standards and industry or general national legislation. In the field of CI information security as a component of national security, we believe that it is good practice for the CI operator to select security controls to be implemented at the CI facility and to be guided by them in their daily activities based on ISO 27002: define corporate security policy; organisation of information security; asset management; personnel security; communications and operations management; access control; acquisition, development and maintenance of information systems; security incident management; business continuity management; compliance with applicable laws; review and audit of the existing integrated security management system.
APA, Harvard, Vancouver, ISO, and other styles
28

Serhiienko, Olena, Natalia Volosnikova, Yulia Yehorova, Kateryna Makarchuk, and Natalia Sokolova. "STRATEGIZING DIRECTIONS OF FINANCIAL ASPECT DEVELOPMENT IN THE CORPORATE SECURITY SYSTEM OF AN INDUSTRIAL ENTERPRISE." Financial and credit activity problems of theory and practice 5, no. 52 (2023): 190–207. http://dx.doi.org/10.55643/fcaptp.5.52.2023.4105.

Full text
Abstract:
The article develops and substantiates the concept of the financial strategy of the corporate insurance system. The scheme of formation of the financial strategy of corporate security at an enterprise is analyzed.It is proven that an important criterion for ensuring the effectiveness of the financial strategy of an enterprise corporate security system is to detail and specify its functions, which are divided into two components: the processes of formation and use of enterprise financial resources.It is emphasized that in order to implement an effective strategy for achieving competitive advantages, it is necessary to ensure the appropriate level of management system development which is capable of ensuring the integration of functional areas of its activity. The achievement of interaction and coherence of implemented measures in each of the areas of an enterprise activity should be coordinated according to the general strategy.It has been confirmed that the economic effect plays an important role in the economic development of the corporate security system. In addition, the requirement of consistency of material, financial, information and other types of resource flows of integrated logistics processes at enterprises is particularly relevant.We made the conclusion that one of the tasks of the corporate security system in terms of financial resource provision management is tracking the intensity and targeting of resource provision flows, forecasting costs and benefits when achieving mutual goals of both the corporate security system and local elements of corporate security.
APA, Harvard, Vancouver, ISO, and other styles
29

Demianchuk, Vitalii, and Pavlo Bortsevych. "COMPARATIVE LEGAL ASPECTS OF ENSURING THE ECONOMIC SECURITY OF COMPANIES IN RESOLVING CORPORATE CONFLICTS IN UKRAINE AND THE UNITED STATES." Baltic Journal of Economic Studies 5, no. 1 (2019): 54. http://dx.doi.org/10.30525/2256-0742/2019-5-1-54-58.

Full text
Abstract:
The aim of the article is to reveal the legal nature of corporate conflicts and ways to overcome them in Ukraine and the United States. The subject of the study is corporate conflicts caused by the corporate relations that arise between the owners of corporate rights, as well as the relationship between the owners of corporate rights and management bodies of the company. Methodology. The study is based on general scientific and specialscientific methods and techniques of scientific knowledge. The logical semantic method enabled to determine the content of the concepts of “corporate conflict” and “greenmail”. The comparative legal method enabled to compare the doctrinal approaches to this issue. The same method enabled to analyse US law regarding the subject matter. The normative dogmatic method enabled to interpret the content of legal regulations of domestic and foreign legislation that regulate the issue of corporate conflicts and ways to overcome them. The system-structural method enabled to analyse objective and subjective causes of corporate conflicts. Methods of analysis and synthesis enabled to distinguish features of corporate blackmail as the cause of corporate conflicts. The method of legal modelling enabled to develop proposals regarding greenmail prevention in Ukraine. Practical implications. Studies on the issue of greenmail in the US helped to develop recommendations for prevention of greenmail in Ukraine, as well as to identify issues requiring further consideration and research. Relevance/originality. The concepts of “corporate conflict” and “greenmail” are defined. The objective and subjective causes of the occurrence of corporate conflicts, the reasons for their occurrence, as well as the subjective component of the parties to the corporate conflict are analysed. The absence of the legal definition of the concept of greenmail and the effective mechanism of its prevention is stated, therefore, appropriate recommendations to prevent its occurrence are formulated.
APA, Harvard, Vancouver, ISO, and other styles
30

Volosnikova, Nataliia, Natalia Reshetniak, and Fedir Abramov. "STRATEGY OF THE FINANCIAL SYSTEM OF THE CORPORATE SECURITY OF THE INDUSTRIAL ENTERPRISE." Bulletin of the National Technical University "Kharkiv Polytechnic Institute" (economic sciences), no. 1 (January 2, 2023): 10–13. http://dx.doi.org/10.20998/2519-4461.2023.1.10.

Full text
Abstract:
The purpose of the article is to determine the general directions of strategizing the financial system of corporate security of an industrial enterprise. A scheme for forming a financial strategy of corporate security at the enterprise is proposed. It is noted that in order to ensure the effectiveness of the financial strategy of the enterprise's corporate security system, it is necessary to detail and specify its functions, it is proposed to divide these functions into two components: the processes of formation and use of the enterprise's financial resources. A generalized scheme of the functions of entities managing the financial resources of the enterprise is highlighted. The functions of managing financial resources are determined, based on which it is concluded that the financial strategy of the corporate security system at enterprises ensures the formation and effective use of the financial resources of the enterprise, the compliance of financial actions with the economic state and resource provision of the enterprise, and the correct selection of the goals of financial actions and their maneuvering aimed at achieving decisive advantage. It was noted that the objectives of the strategy of corporate security of an industrial enterprise should be subordinated to the general strategy of economic development, and the task of the financial strategy of the system of corporate security of the enterprise is to: determine the methods of conducting successful financial activities at enterprises; determination of promising financial transactions, financial support of operational activities at enterprises, development and implementation of measures to ensure the financial stability of the enterprise, development of methods of exiting the crisis state, in case of its occurrence, and methods of enterprise management. It is noted that consideration and justification of the implementation of the strategy for the formation of general corporate security is carried out through the prism of decision-making. The scheme of forming a general corporate security strategy is analyzed. It is noted that the economic effect plays an important role in the economic development of the corporate insurance system. It was concluded that the study of the peculiarities of the manifestations of the synergistic effects of the corporate insurance system leads to the analysis of factors that prevent the effective functioning of the management mechanism of the corporate insurance system.
APA, Harvard, Vancouver, ISO, and other styles
31

Shkolnyk, Inna, Serhiy Frolov, Volodymyr Orlov, Victoriia Datsenko, and Yevhenii Kozmenko. "The impact of financial digitalization on ensuring the economic security of a country at war: New measurement vectors." Investment Management and Financial Innovations 19, no. 3 (2022): 119–38. http://dx.doi.org/10.21511/imfi.19(3).2022.11.

Full text
Abstract:
The military actions in Ukraine have actualized the transformation and revision of existing approaches to assessing the country’s economic security. Financial security, which is considered in this paper through its standard components such as financial sector security, stock market security, debt and budget security, has a significant effect on the formation of economic security. At the same time, digitalization in the financial sector was identified as a new component that provides access to financial resources even in the context of the deployment of hostilities in Ukraine. Therefore, this study assessed the effect of the state of financial security, taking into account the importance of financial digitalization for the economic security of Ukraine. Based on quarterly data for the period 2015–2021, 42 indicators were analyzed, which were grouped according to the relevant components of financial security, and their integral indicators were determined using the Harrington method. A factor analysis of the formation of economic security was carried out using the principal components analysis, and an integral indicator of a country’s economic security was calculated based on the Kinney multiplicative convolution. The integral indicator of economic security for 2025–2021 doubled and amounted to 0.63 units, which was due to the increased influence of financial digitalization processes, all other components either slowly decreased or were stable. Thus, the reserve of economic security that was formed during this period, including due to the intensive digitalization of the financial sector, allowed Ukraine to survive the first weeks of the war and ensure the functioning of the financial system. Acknowledgment Comments from the Editor and anonymous referees have been gratefully acknowledged. Inna Shkolnyk and Yevhenii Kozmenko gratefully acknowledge financial support from the Ministry of Education and Science of Ukraine (0122U000774 “Digitalization and transparency of public, corporate and personal finance: the impact on innovation development and national security”).
APA, Harvard, Vancouver, ISO, and other styles
32

Saáry, Réka, Ágnes Csiszárik-Kocsir, and János Varga. "Examination of the Consumers’ Expectations Regarding Company’s Contribution to Ontological Security." Sustainability 13, no. 17 (2021): 9987. http://dx.doi.org/10.3390/su13179987.

Full text
Abstract:
Security is considered a basic human need, according to Maslow’s hierarchy; however, it is hard to define exactly what the term means. Globalization, the digital environment, bring new dimensions and increasingly diverse interpretations of security to life. These new approaches, while reducing the consistency of the concept, allow an understanding of individual attitudes towards security. In recent years, several researchers have analyzed the psychological dimension of security at a personal level and ontological security in relation to citizens, residents, employees and students; however, based on a review of research history, there is still a scientific gap with regard to the perspective of customers and consumers. Accepting the fact that market actors are increasingly taking their share of creating a secure environment, in our empirical study we focus on corporate involvement and contribution through an examination of consumers’ perceptions of security. Corporate security is originally a field supporting the smooth operation of the organization, but nowadays it has become an important element of corporate strategy and also a factor of competitiveness. Keeping that in mind, our objective is to get a picture of how consumers judge the contribution of companies to the general sense of security in Hungary, what security-related tasks they expect from the corporate actors, and how they feel about a company’s security-related performance. In our study, we develop the ontological security model of consumers, into which we integrate—next to the individual socio-psychological features and the macro-environmental elements—the dimension of the assessment of corporate performance, the possible components of which are analyzed during the quantitative primary research.
APA, Harvard, Vancouver, ISO, and other styles
33

Kryukov, Dmitry, and Raimonds Strauss. "Information security governance as key performance indicator for financial institutions." Scientific Journal of Riga Technical University. Computer Sciences 38, no. 38 (2009): 161–67. http://dx.doi.org/10.2478/v10143-009-0014-x.

Full text
Abstract:
Information security governance as key performance indicator for financial institutions Due to their nature financial institutions and their performance are in constant focus of attention from different stakeholder groups. These groups according to their functions and interests are implementing different sets of key performance indicators for financial institution performance assessment. In the proposed paper authors present a hypothesis of information security governance being a financial institution key performance indicator. Authors provide high level overview of existing situation in key performance indicator domain for financial institutions. The overview of stakeholder groups interested in financial institution performance management is provided. In the same way as corporate governance is treated as financial and operational performance reflecting and influencing factor, information security governance as a component of corporate governance, according to authors' opinion, should be treated as key performance indicator for financial institutions. In the paper the most indicative financial performance indicators as well as their calculation methods are defined for financial institutions. The paper contains overview of information security assessment models and researches in this field. Authors have chosen information security maturity model to use in testing hypothesis. The paper contains description of calculation methodology for financial performance indicators and information security maturity indicators. The hypothesis has been proved performing analysis of correlation between calculated financial performance indicators and information security governance model indicators for chosen Latvian financial institutions.
APA, Harvard, Vancouver, ISO, and other styles
34

Rudenko, Inna, Alina Kolesnyk, Tetiana Bolotova, et al. "Methodological approach to mutually agreed corporate image management and economic security of enterprise." ScienceRise, no. 2 (April 30, 2021): 53–58. https://doi.org/10.21303/2313-8416.2021.001790.

Full text
Abstract:
The object of research: corporate image and enterprise economic security. Investigated problem: methodical approach to mutually agreed management of enterprise's image and its economic security. The main scientific results: theoretical analysis of the opinions, which are presented in the scientific literature of enterprise economic security functional components and the mechanism of their formation, is carried out. The functional components of economic security related to the internal and external aspects of enterprise are studied in detail, and their close relationship with image components is determined. The stages of enterprise image management are schematically shown with taking into account the compliance of image economic security components levels. The area of practical use of the research results: the need to adhere to certain sequence of actions aimed at forming a positive image and managing it in enterprises is emphasized. It is advisable to use an approach to the formation of corporate image with taking into account the targeted influence of management entities on the business environment. Technological innovation: the enterprise economic security structure in the context of modern tendencies is proposed, the complex of measures which are recommended to be applied for enterprise image maintenance is determined. Scope of application for technological innovation: practical activity of Ukrainian enterprises is in interconnection with other business environment participants.
APA, Harvard, Vancouver, ISO, and other styles
35

DOVGAN, O., and A. TARASYUK. "Corporate cyber security culture for scientific and research institutions." INFORMATION AND LAW, no. 2(25) (June 26, 2018): 51–61. http://dx.doi.org/10.37750/2616-6798.2018.2(25).270716.

Full text
Abstract:
The paper presents an author’s perspective of internal cyber security of scientific and research institutions, its components, principles and methods of formation. The main attention is paid to the issues of ensuring the cyber security of scientific institutions in the context of copyright and related rights protection, honor, dignity, business reputation of individuals and legal entities.
APA, Harvard, Vancouver, ISO, and other styles
36

Prokopenko, Olha, Maksym Slatvinskyi, Nataliia Biloshkurska, Mykola Biloshkurskyi, and Vitaliy Omelyanenko. "Methodology of national investment and innovation security analytics." Problems and Perspectives in Management 17, no. 1 (2019): 380–94. http://dx.doi.org/10.21511/ppm.17(1).2019.33.

Full text
Abstract:
The main problem of the research is development of a conceptual framework for investment and innovation security, as well as the methodological approach to its assessment, which will allow monitoring and identifying the threats and achieving the desired security state of the national economy. It has been proved that investment and innovation security is a multi-level phenomenon, consisting of the following levels: global, national, corporate and household ones. Investment and innovation security is determined by three components, such as state security at the external and internal markets, security of enterprises (corporations) and individual households, which requires their balancing. The methodical approach to the integrated assessment of the investment and innovation security level is developed, which involves the development of integral index as the geometric mean of 3 sub-indices, which include single indices under the national, corporate and household level. The results of this methodological approach approbation allowed us to form preconditions for finding ways of growth, forecasting trends and building scenarios for strengthening the investment and economic security of Ukraine.
APA, Harvard, Vancouver, ISO, and other styles
37

Volosnikova, Nataliia, Natalia Reshetniak, and Fedir Abramov. "MANAGEMENT OF THE FINANCIAL SECURITY OF THE ENTERPRISE IN MODERN CONDITIONS." Bulletin of the National Technical University "Kharkiv Polytechnic Institute" (economic sciences), no. 2 (March 1, 2023): 37–40. http://dx.doi.org/10.20998/2519-4461.2023.2.37.

Full text
Abstract:
The article examines the concept of financial support as a set of necessary resources and sources of their formation for the effective functioning of the enterprise. It is noted that significant difficulties in the formation and adoption of the current production plan arise with limited resources. The essence of the financial support structure is determined, the main principles on which the financial support mechanism is based and the importance of financial support both at the operational and strategic level of enterprise management are characterized. The analysis was carried out and directions for improvement of resource provision at the enterprise were considered. The resource limitations of an industrial enterprise during the formation of a plan include limitations on the provision of material, labor, financial and informational resources. The principle of calculating the need for the specified types of resources using the economic-mathematical model of the cumulative production technology of the industrial enterprise is proposed. It is substantiated that the synergistic effect of the corporate security system depends on such factors as the resource provision of the enterprise, the consistency of the direction of movement of the vectors of subsystems of economic, technological, informational, legal, financial, personnel, transactional, logistical and resource security with the goals of the general strategy of corporate security, construction features dynamic system of corporate security; influential changes in the micro- and macroeconomic environment, reliability of the general system of corporate security, stability and efficiency of the management system of the system of corporate security; characteristics of the corporate security system. It was concluded that the basis of the synergistic effect of the corporate security system is the optimal combination of individual elements of the system, the effectiveness of their interaction and quality. A model of the organizational and economic interaction of the processes of using structural components of financial support for enterprise activity is proposed, and an algorithm for the formation of resource support for enterprise activity in modern conditions is presented.
APA, Harvard, Vancouver, ISO, and other styles
38

ФУРСОВА, Олена, та Світлана ГРЕБІНСЬКА. "ЧИННИКИ ТА ІНСТРУМЕНТИ ЗБЕРЕЖЕННЯ І ПІДТРИМКИ БІЗНЕСУ В УМОВАХ ВІЙНИ: ФІНАНСОВІ ТА СТРАХОВІ АСПЕКТИ". Herald of Khmelnytskyi National University. Economic sciences 334, № 5 (2024): 338–43. http://dx.doi.org/10.31891/2307-5740-2024-334-50.

Full text
Abstract:
The article considers the aspects of ensuring the viability of economic entities in the critically difficult conditions of a full-scale war. As stated, in world practice, the fact of the functioning of the national economy of a country under military aggression, and even more so the preservation of the viability of economic agents, is considered paradoxical a priori. However, this has been a common practice for Ukraine for three years. The purpose of the study is to identify the factors and justify the tools of the state and corporate policy of preserving and supporting Ukrainian business in the conditions of war with the use of financial and insurance means for such purposes. Threats to the financial security of domestic economic entities in war conditions were determined by such components of security as credit, insurance, monetary, budgetary and tax, investment and fund security. Based on the same components, a policy toolkit for supporting domestic business in wartime conditions was developed, in particular in the sense of financial and insurance aspects of regulation. It was established that in the conditions of a full-scale war, the following became the dominant threats to the financial security of domestic business entities: freezing of investment projects, loss of foreign investment, destruction of facilities (investment component of financial security of enterprises); complication of attracting financial and credit resources, growth of external and internal debt, difficulty of attracting credit funds (credit component); devaluation of the national monetary unit, slowdown in the circulation of funds, difficulties in settlements with counterparties (monetary component); increase in the level of tax liabilities, decrease in the level of budget investment, delays in calculations (budget and tax component); problems of securities issuance, a decrease in the level of dividend distribution, the decline of the country’s stock system (stock component); aggravation of the problems of insurance of military risks, increase in the cost of insurance services, actualization of the problems of internal and self-insurance (insurance component). Policy instruments for strengthening the financial security of business in wartime conditions have been defined. This is the diversification of sources of investment formation, consideration of investment options abroad, however, for the production of products in the domestic market; activation of cooperation programs between enterprises to replace credit resources, optimization of internal and external debt, replacement of part of operations in foreign currency, formation of insurance and reserve funds, "decomposition" of business into separate components, detinization and legalization of business, proactive state policy in this area, use of public investment instruments, improvement of conditions for purchasing OVDP bonds, diversification of state securities, active investment policy of enterprises, improvement of war risk insurance instruments, active involvement of foreign companies to the domestic insurance market.
APA, Harvard, Vancouver, ISO, and other styles
39

Chilunjika, Alouis, Dominique Uwizeyimana, and Sharon Chilunjika. "The nexus between leadership and the performance of the National Social Security Authority (NSSA) in Zimbabwe." International Journal of Research in Business and Social Science (2147- 4478) 12, no. 2 (2023): 320–29. http://dx.doi.org/10.20525/ijrbs.v12i2.2399.

Full text
Abstract:
The study examined the role of leadership in the performance of the National Social Security Authority (NSSA) in Zimbabwe. The study employed mixed methods research, which triangulated qualitative and quantitative techniques. Respondents for the questionnaires were selected using simple random sampling. Participants for interviews were purposively selected. Written records were also used to collect data. Data from questionnaires were analyzed using Statistical Package for Social Scientists (SPSS), and qualitative data were analyzed using thematic and content analysis. The study established leadership as a crucial component for NSSA’s satisfactory performance, with investment activities, service delivery, and corporate social responsibility used to gauge NSSA’s performance. The study recommended the intricate interaction of the leadership and the employees and the creation of a robust corporate governance framework to do away with political prying and enhance efficiency and effectiveness in the running of NSSA.
APA, Harvard, Vancouver, ISO, and other styles
40

Kovalenko, Victoria, Maryna Slatvinska, Sergii Sheludko, Serhii Makukha, and Volodymyr Valihura. "THE MONETARY COMPONENT IN ENSURING THE FINANCIAL SECURITY OF THE STATE." Financial and credit activity problems of theory and practice 1, no. 48 (2023): 8–22. http://dx.doi.org/10.55643/fcaptp.1.48.2023.3972.

Full text
Abstract:
The paper studies the place and degree of the monetary component's influence on the level of financial security of the state in the conditions of political and socio-economic imbalances in the development of Ukraine. The aim of the research is to investigate the effectiveness of monetary policy instruments, to determine the level of the monetary component's impact on the financial security of the state, as well as to form perspectives for balancing the symbiosis of "monetary policy and national financial security". Based on the conducted research, it is established that in recent years the role of the financial security system formation at all levels has significantly increased, whether it is macroeconomic security, the security of economical subjects, or the financial security of a household. At the same time, the monetary component plays a significant role in ensuring the financial security of the state, namely, it affects macroeconomic processes in the country. Therefore, in order to ensure macroeconomic stability and economic growth in the context of ensuring the financial security of Ukraine under martial law, it is necessary to improve the mechanisms of monetary policy. The article analyzes the latest threats that lead to the negative impact of the monetary component on the financial security of the state. These include: the consequences of russian military aggression on the economic development of Ukraine, continued COVID-19 outbreaks, the introduction of administrative restrictions on the use of monetary policy instruments by the National bank of Ukraine, violations of the economic security of financial institutions, an insufficient level of financial inclusion, and the contradictory nature of the coordination of monetary and fiscal policies. In the context of establishing the decisive role of the monetary component in ensuring the financial security of the state, the adopted development strategies at the level of national security of Ukraine and at the level of the monetary sector of Ukraine are considered and systematized. The block diagram of the implementation of monetary policy in the context of ensuring the financial security of the state is proposed. It is proved that the mechanism of such interrelationship is implemented through the instruments and methods of monetary policy in combination with key macroeconomic indicators. To confirm the proposed hypothesis, the econometric model of the influence of monetary instruments on the level of financial security of the state is developed. As a proxy indicator of the financial security of Ukraine, the Financial Stress Index is used, which reflects the current state of the financial sector (without considering future risks) and consists of sub-indices for the banking sector, households, government and corporate securities, and foreign exchange market. Estimated and re-estimated models made it possible to determine the most influential indicators of the monetary component of the Financial Stress Index, namely: consumer price index; producer price index; GDP to monetary aggregate M2 ratio; cash to GDP ratio; share of foreign currency in monetary aggregate M3; NBU key policy rate (annual average); share of non-performing loans (NPL). The proposed model can be used to forecast the influence of the parameters of the monetary component on the level of financial security of the state.Based on the results of the study, it is proved that, despite the difficult political and economic situation in Ukraine, it is necessary to focus on improving the coordination of monetary and fiscal policies, considering the further implementation of the main provisions of international documents adopted by International Monetary Fund on this issue.
APA, Harvard, Vancouver, ISO, and other styles
41

СОРОКІВСЬКА, Олена, Тетяна КУЖДА та Назар КІНАЛЬ. "ЦИФРОВІ РИЗИКИ ТА ІНФОРМАЦІЙНА БЕЗПЕКА КОРПОРАТИВНОГО СЕКТОРУ". Herald of Khmelnytskyi National University. Economic sciences 342, № 3(1) (2025): 95–105. https://doi.org/10.31891/2307-5740-2025-342-3(1)-14.

Full text
Abstract:
The article explores current issues of digital risks and information security in the corporate sector amid increasing cyber threats. The authors analyze the specifics of modern threats faced by companies, including risks of unauthorized access, data breaches, DDoS attacks, phishing campaigns, and malware. Special attention is given to the analysis of cybersecurity in wartime conditions, where companies become targets for hostile hacker groups aiming to destabilize the economy and undermine trust in businesses. The study presents the dynamics of the growing number of cyberattacks during 2022–2024, identifies the key business sectors most vulnerable to threats, and examines their impact on enterprises. A separate section is devoted to analyzing European experience in corporate cybersecurity, comparing the level of implementation of information security measures among EU and Ukrainian enterprises. The research has shown that despite the high level of awareness among Ukrainian companies regarding cybersecurity, the documentation of security policies and their regular review remain insufficient, increasing the likelihood of successful attacks. Based on the obtained results, a model for organizing and managing corporate information security has been developed. This model consists of five key components: organizational structure, technological solutions, risk management, corporate data protection, and control &amp; audit. The proposed model aims to minimize cyber threats, enhance the resilience of the corporate environment, and strengthen trust among clients and partners. It can be utilized by company executives, IT specialists, and information security professionals to develop effective strategies for protecting corporate information systems in the context of digital transformation and increasing cyber threats.
APA, Harvard, Vancouver, ISO, and other styles
42

Zatonatskiy, D., V. Marhasova, and N. Korogod. "INSIDER THREAT MANAGEMENT AS AN ELEMENT OF THE CORPORATE ECONOMIC SECURITY." Financial and credit activity: problems of theory and practice 1, no. 36 (2021): 149–58. http://dx.doi.org/10.18371/fcaptp.v1i36.227690.

Full text
Abstract:
This paper considers the insider threats in the companies from different sectors and various methods of their assessment. The problem of information leakage is becoming increasingly important for companies in all areas of economic activity. The problem of insider threats is becoming increasingly important, as the company may incur losses not only due to the leakage of information about its inventions, but also through lawsuits in case of theft of personal information of the customers, contractors and more. This means that in order to gain access to the international markets, Ukrainian companies must have an appropriate level of protection not only of the company’s confidential information, but also of the data on customers, contractors, etc. The objective of the article is to analyze the existing methodological approaches to the assessment of insider threats in the enterprise as a component of personnel and economic security. We came to the conclusion that different industries have different vulnerabilities to insider threats and different approaches to insider threat management. It was determined that information leaks are a serious threat to the company’s economic and personnel security. It was discovered that firms have achieved significant improvements and developed effective procedures for counteracting external threats, however, protection against insider attacks remains rather low. In the course of the research, the concept of an insider attacker was defined, the types of insider threats were established, and the main actions of the personnel prior to the insider attack were outlined. It was proved that the degree of insider threat is determined by the type of activity of the company and the liquidity of information that may be leaked. Most leaks are observed in high-tech companies and medical institutions, while the most liquid is the information of banks, financial institutions, industrial and commercial companies.
APA, Harvard, Vancouver, ISO, and other styles
43

Levkovets, N. P. "Integrated assessment of corporate security of a motor transport enterprise." Izvestiya MGTU MAMI 7, no. 4-1 (2013): 306–12. http://dx.doi.org/10.17816/2074-0530-68310.

Full text
Abstract:
The article reveals the essence of company’s security. There is developed a comprehensive methodology for assessing the economic security of a motor transport enterprise taking into account the major functional components of safety and recommendations on increasing the level of economic safety of the motor company and calculations are also made.
APA, Harvard, Vancouver, ISO, and other styles
44

Bezdelov, A. D., and E. V. Loginova. "Managing Cyber-Security of in-Bank Ecosystem in Conditions of Digitalization." Vestnik of the Plekhanov Russian University of Economics 17, no. 6 (2020): 198–207. http://dx.doi.org/10.21686/2413-2829-2020-6-198-207.

Full text
Abstract:
Information technologies (IT) play a key role in corporate infrastructure. They provide unprecedented economic development of enterprises in our era. IT systems help economize resources and give an opportunity to peep in the essence of corporate transactions. Finance service market develops energetically due to digital economy shaping. Digital technologies have penetrated all spheres of life and the level of innovation technology equipment keeps on growing at the expense of mobile technologies. The system of in-company finance control is included n the structure of management functioning as an obligatory element of the current mechanism of management. The development of programs of in-bank control is a necessary component of work of any finance and credit organization according to international and national legislation. The article describes the structure of unique in-bank mechanism of control, oriented to preventing legalization of criminal incomes and raining personnel for services of internal bank control. The article analyzes in-bank programs aimed at its organization and grounds functional responsibilities of employees in divisions of internal control integrated in the system of monitoring and managing bank risks. The role of questionnaires differentiated by clients’ types is assessed, with the help of which the bank can identify its clients. Programs of training employees of internal control divisions are structured.
APA, Harvard, Vancouver, ISO, and other styles
45

P, Vivekanand, and Kamal Kumar Srivastava Dr. "Cyber security challenges within the connected home ecosystem futures." International Journal of Trends in Emerging Research and Development 1, no. 1 (2023): 314–18. https://doi.org/10.5281/zenodo.14245759.

Full text
Abstract:
The future of linked home ecosystems is far closer to cybercrime and cyber security risks than was previously believed. Most studies examine the protection mechanisms of government and corporate networks, but the gadgets utilized in today's and tomorrow's linked smart homes provide a significant vulnerability. This report is a component of a larger study looking at the effects and obstacles posed by cybersecurity threats to internet-connected smart gadgets in the home. We discuss the history and drivers behind the increasing need for all of our smart gadgets to work together seamlessly, so that we can provide our consumers access to a wide range of features and capabilities. Despite these technologies' increased utility, the report stresses the fact that they also pose new dangers. Then, we go into the current cybersecurity concerns surrounding smart devices in smart homes and examine them in depth.
APA, Harvard, Vancouver, ISO, and other styles
46

Rudenko, Inna, Alina Kolesnyk, Tetiana Bolotova, et al. "Methodological approach to mutually agreed corporate image management and economic security of enterprise." ScienceRise, no. 2 (April 30, 2021): 53–58. http://dx.doi.org/10.21303/2313-8416.2021.001790.

Full text
Abstract:
The object of research: corporate image and enterprise economic security.&#x0D; Investigated problem: methodical approach to mutually agreed management of enterprise’s image and its economic security.&#x0D; The main scientific results: theoretical analysis of the opinions, which are presented in the scientific literature of enterprise economic security functional components and the mechanism of their formation, is carried out. The functional components of economic security related to the internal and external aspects of enterprise are studied in detail, and their close relationship with image components is determined. The stages of enterprise image management are schematically shown with taking into account the compliance of image economic security components levels.&#x0D; The area of practical use of the research results: the need to adhere to certain sequence of actions aimed at forming a positive image and managing it in enterprises is emphasized. It is advisable to use an approach to the formation of corporate image with taking into account the targeted influence of management entities on the business environment.&#x0D; Technological innovation: the enterprise economic security structure in the context of modern tendencies is proposed, the complex of measures which are recommended to be applied for enterprise image maintenance is determined.&#x0D; Scope of application for technological innovation: practical activity of Ukrainian enterprises is in interconnection with other business environment participants.
APA, Harvard, Vancouver, ISO, and other styles
47

Strelbitskyi, M., R. Khoptynskyi, O. Vavrichen, and R. Horodyskyi. "Approach to creation model of software-oriented communication network of the State Border Guard Service of Ukraine." Communication, informatization and cybersecurity systems and technologies, no. 5 (June 1, 2024): 154–64. http://dx.doi.org/10.58254/viti.5.2024.14.154.

Full text
Abstract:
Enhancing the level of information resource protection of the State Border Guard Service of Ukraine, as a component of Ukraine's defense forces, is an important task, especially in times of war. An effective and reliable corporate network of the border agency becomes a key component for ensuring security, coordination, and responsiveness to both internal and external threats. One aspect of developing the information space is the development of the transport network of the State Border Guard Service. Analysis of existing technologies, identifying their advantages and disadvantages, allowed for the identification of Software-Defined Wide Area Networking technology as the one that best meets the conformity criteria defined by the experts of the Communication and Information Systems Management. This technology not only allows for optimizing network traffic and ensuring high-speed data transmission but also guarantees flexibility in network management and enhances security. For the State Border Guard Service, responsible for the security of the country's borders, the use of advanced Software-Defined Wide Area Networking technologies can be crucial for optimizing operations and ensuring the highest level of information security. The article focuses on developing a conceptual model for building the corporate network of the State Border Guard Service based on Software-Defined Wide Area Networking technology. The main goal of the research is to consider the possibility of implementing this technology in the context of its application by Ukraine's defense forces and to analyze its advantages and disadvantages. The research task was to study the technical aspects of implementing Software-Defined Wide Area Networking, namely: configuration of network devices, traffic management, security monitoring, and data protection. Cisco's Software-Defined Wide Area Networking has applied an optimal approach to network architecture, which separates the control plane from the data plane of all peripheral routers and implements all control functions in a centralized software controller called vSmart. Practical recommendations from the research allowed for ensuring continuous network service by rerouting around failures and potential causes of downtime.
APA, Harvard, Vancouver, ISO, and other styles
48

Budnyk, L., I. Blazhei, and O. Ronska. "Internal audit in the enterprise economic security management: important aspects." Galic'kij ekonomičnij visnik 71, no. 4 (2021): 77–84. http://dx.doi.org/10.33108/galicianvisnyk_tntu2021.04.077.

Full text
Abstract:
Effective management of the enterprise financial and economic activities is based primarily on the application of a set of relevant and reliable data concerning its financial status, provided by internal audit procedures. The factors arising interest in internal audit, such as: streamlining business processes; the need to obtain independent and objective information on the state of affairs; ensuring the economic security of the company are identified in this paper. In order to substantiate the tasks of internal audit for ensuring the economic security of the enterprise, the main sources of threats and objects of protection investigated in the process of internal audit are defined. It is substantiated that one of the important tendencies in the development of internal audit is the increase of its level from the tester of control procedures to the analyst of the most important risks. The functions of internal audit in ensuring the security of the company are analyzed. They include: assessment of the economic security system as a whole and providing information to the board of directors and senior management; participation in the implementation of the enterprise security process procedures. A new and important direction for internal audit development – audit of corporate culture is defined. The main tasks of internal audit in this area are to assess how effective measures are provided in the company for the purposeful formation of corporate culture; how the existing level of corporate culture is assessed. Recommendations for the organization of internal audit are given, the following three main approaches are highlighted: creation of own internal audit service; use of services of outsourcing companies; co-sourcing – the division of functions for internal audit in the company between its own service and the involvement of external experts in solving certain tasks. It is proved that the need to introduce internal audit meets the requirements of economic security of the enterprise, information and management needs of economic entities, the specific facts of the internal audit. It is substantiated that internal audit is an integral part of quality control of enterprise management processes and a component of general audit, organized in the interests of owners and regulated by regulations on compliance with the established order of economic activity, property protection and economic security.
APA, Harvard, Vancouver, ISO, and other styles
49

Budnyk, L., I. Blazhei, and O. Ronska. "Internal audit in the enterprise economic security management: important aspects." Galic'kij ekonomičnij visnik 71, no. 4 (2021): 77–84. http://dx.doi.org/10.33108/galicianvisnyk_tntu2021.04.077.

Full text
Abstract:
Effective management of the enterprise financial and economic activities is based primarily on the application of a set of relevant and reliable data concerning its financial status, provided by internal audit procedures. The factors arising interest in internal audit, such as: streamlining business processes; the need to obtain independent and objective information on the state of affairs; ensuring the economic security of the company are identified in this paper. In order to substantiate the tasks of internal audit for ensuring the economic security of the enterprise, the main sources of threats and objects of protection investigated in the process of internal audit are defined. It is substantiated that one of the important tendencies in the development of internal audit is the increase of its level from the tester of control procedures to the analyst of the most important risks. The functions of internal audit in ensuring the security of the company are analyzed. They include: assessment of the economic security system as a whole and providing information to the board of directors and senior management; participation in the implementation of the enterprise security process procedures. A new and important direction for internal audit development – audit of corporate culture is defined. The main tasks of internal audit in this area are to assess how effective measures are provided in the company for the purposeful formation of corporate culture; how the existing level of corporate culture is assessed. Recommendations for the organization of internal audit are given, the following three main approaches are highlighted: creation of own internal audit service; use of services of outsourcing companies; co-sourcing – the division of functions for internal audit in the company between its own service and the involvement of external experts in solving certain tasks. It is proved that the need to introduce internal audit meets the requirements of economic security of the enterprise, information and management needs of economic entities, the specific facts of the internal audit. It is substantiated that internal audit is an integral part of quality control of enterprise management processes and a component of general audit, organized in the interests of owners and regulated by regulations on compliance with the established order of economic activity, property protection and economic security.
APA, Harvard, Vancouver, ISO, and other styles
50

Shulaeva, Ekaterina, and Alena Marinich. "DEVELOPMENT OF AN ENTERPRISE INFORMATION ENVIRONMENT SECURITY MONITORING SYSTEM." Electrical and data processing facilities and systems 19, no. 1 (2023): 144–55. http://dx.doi.org/10.17122/1999-5458-2023-19-1-144-155.

Full text
Abstract:
The relevance The urgency of ensuring information security (IS) is due to the increase in the volume of information circulating in local area networks (LAN) and the expansion of the range of tasks solved with the help of information systems (IS), there is a problem associated with an increase in the number of threats and increased vulnerability of information resources. This is due to the action of factors such as: expanding the range of tasks solved by the IP; increasing the complexity of information processing algorithms; increasing the volume of processed information; complication of LAN software and hardware components, and, accordingly, an increase in the likelihood of errors and vulnerabilities; increased aggressiveness of external data sources (global networks); the emergence of new types of threats. Traditional means of ensuring the information security of corporate networks include antiviruses, vulnerability detectors, firewalls and intrusion detectors. The functions of such information security systems are specific and solve individual tasks of ensuring the information security of a corporate network and, as a rule, can be overcome with the teamwork of a qualified group of violators. Such groups are aware of the capabilities of the security tools used in the corporate network, respond to updates of the vulnerability database of widely used software (software) published in special publications and the Internet, promptly exchange the results of probing the protection of the attacked corporate network and flexibly change the tactics of the invasion. Aim of research Implementation of Zabbix SCS monitoring system and pfsense firewall/ router with implementation of information traffic management. Research methods: — Zabbix programming environment; — pfsense programming environment. Results This article discusses the creation of the Zabbix monitoring system and the pfsence system at the AST LLC enterprise, Bashkortostan Republic, Sterlitamak. As a result of the configuration and creation of rules, as well as the implementation of SCS monitoring, the enterprise receives a system of protection against unauthorized access and a system of protection against corporate network attacks.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!