Access to data is a nefralgic information security zone. On the one hand, we do everything to protect them against disclosure, and on the other hand, we need a new employee to provide data and information to be able to do their job. Managing access to data in the enterprise significantly affects the level of security in all areas of activity. The article presents the results of research in the field of security of policy objectives in a selected production company. The purpose of preliminary research is to analyze selected issues in the field of data access, control methods and employee responsibility. The article discusses the results of research on the access to information by employees. Lack of access to the data paralyzes their work, bu...
Due to the rise of data breaches, organisations constantly need to develop new strategies and securi...
Information is a special type of resource in an enterprise. is an indispensable element of every act...
This article focuses on how to revolutionize ICT in Rwanda, this study examined how security, data, ...
Harmony between sectors of a company is something that adds a lot of value to the institution even m...
The article presents results of research on the information flow between the client and the company,...
The purpose of this study is to extend the legacy threat-vulnerability model to incorporate human a...
Information security inside the organization is becoming a major issue in the modern and global worl...
At present the information and data has become a very important product and has achieved higher valu...
The article presents the results of research on employee awareness of information security. The esse...
The strategic importance of information for the functioning of each economic entity forces entrepren...
This paper highlights the problem with access rights as a part of information security in enterprise...
The objective of this research is to analyze the relevance of the information security policy in the...
Purpose The aim of this study is to encourage management boards to recognize that employees play a m...
Organisations increasingly perceive their employees as a great asset that needs to be cared for; how...
Circuit information in an organization involves the creation of documents whose content contributes ...
Due to the rise of data breaches, organisations constantly need to develop new strategies and securi...
Information is a special type of resource in an enterprise. is an indispensable element of every act...
This article focuses on how to revolutionize ICT in Rwanda, this study examined how security, data, ...
Harmony between sectors of a company is something that adds a lot of value to the institution even m...
The article presents results of research on the information flow between the client and the company,...
The purpose of this study is to extend the legacy threat-vulnerability model to incorporate human a...
Information security inside the organization is becoming a major issue in the modern and global worl...
At present the information and data has become a very important product and has achieved higher valu...
The article presents the results of research on employee awareness of information security. The esse...
The strategic importance of information for the functioning of each economic entity forces entrepren...
This paper highlights the problem with access rights as a part of information security in enterprise...
The objective of this research is to analyze the relevance of the information security policy in the...
Purpose The aim of this study is to encourage management boards to recognize that employees play a m...
Organisations increasingly perceive their employees as a great asset that needs to be cared for; how...
Circuit information in an organization involves the creation of documents whose content contributes ...
Due to the rise of data breaches, organisations constantly need to develop new strategies and securi...
Information is a special type of resource in an enterprise. is an indispensable element of every act...
This article focuses on how to revolutionize ICT in Rwanda, this study examined how security, data, ...