The article actualizes the problem of reliability of enterprise information. The methodological bases of construction and implementation of the information security management system of the company are considered. In accordance with the established purpose of this work, approaches to ensure safe management of information system mechanisms are identified. Solutions have been identified that make it possible to protect information transmitted in domestic and foreign markets. The systems that help automate the functioning of the organization's processes are considered. Based on international standards and the analysis of modern approaches to defining the essence of the information system management model, the key stages of creating an effecti...
This article is an extended version of the study presented at the IEEE Ecuador Technical Chapters Me...
The article concerns the monitoring of elements of the information security system in an enterprise....
News about various information security attacks against companies appears almost every day. The sour...
The article describes the principles of functioning of the information security system of the enterp...
With the continuous development of information technologies the question of effective information se...
Information is the factor which can decide about the potential and market value of a company. An inc...
With the time advancement and the development of information technologies, the process of managing s...
The article improves theoretical approaches to informational security management in the context of c...
The issue of the information safety management in enterprises was characterized. The research of li...
This thesis deals with the introduction of information security management system in IT enterprise. ...
In modern conditions of the 21st century, information security of corporate economics is gaining mor...
The article outlines the concept of maintaining the required security level of the information syste...
The research paper is devoted to the applied and the new information and communication technologies ...
This article is dedicated to the problem of information protection of an enterprise business process...
The research paper is devoted to the applied and the new information and communication technologies ...
This article is an extended version of the study presented at the IEEE Ecuador Technical Chapters Me...
The article concerns the monitoring of elements of the information security system in an enterprise....
News about various information security attacks against companies appears almost every day. The sour...
The article describes the principles of functioning of the information security system of the enterp...
With the continuous development of information technologies the question of effective information se...
Information is the factor which can decide about the potential and market value of a company. An inc...
With the time advancement and the development of information technologies, the process of managing s...
The article improves theoretical approaches to informational security management in the context of c...
The issue of the information safety management in enterprises was characterized. The research of li...
This thesis deals with the introduction of information security management system in IT enterprise. ...
In modern conditions of the 21st century, information security of corporate economics is gaining mor...
The article outlines the concept of maintaining the required security level of the information syste...
The research paper is devoted to the applied and the new information and communication technologies ...
This article is dedicated to the problem of information protection of an enterprise business process...
The research paper is devoted to the applied and the new information and communication technologies ...
This article is an extended version of the study presented at the IEEE Ecuador Technical Chapters Me...
The article concerns the monitoring of elements of the information security system in an enterprise....
News about various information security attacks against companies appears almost every day. The sour...