Protection of information resources as an integral part of economic security of the enterprise

User Rating:  / 0
PoorBest 

Authors:


V.Chubaievskyi, orcid.org/0000-0001-8078-2652, State University of Trade and Economics, Kyiv, Ukraine, e-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.

H.Blakyta, orcid.org/0000-0002-4848-9912, State University of Trade and Economics, Kyiv, Ukraine, e-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.

O.Bogma, orcid.org/0000-0002-5637-6010, State University of Trade and Economics, Kyiv, Ukraine, e-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.

I.Shtuler, orcid.org/0000-0002-0852-8526, National Academy of Management, Kyiv, Ukraine, e-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.

T.Batrakova, orcid.org/0000-0002-5710-9416, Zaporizhzhia National University, Zaporizhzhia, Ukraine, e-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.


повний текст / full article



Naukovyi Visnyk Natsionalnoho Hirnychoho Universytetu. 2022, (4): 117 - 122

https://doi.org/10.33271/nvngu/2022-4/117



Abstract:



Purpose.
To build a mathematical model and algorithms for optimizing the losses that the company may suffer from information threats and the costs necessary to prevent these losses.


Methodology.
General and special methods of cognition were used to perform scientific research: comparative analysis, logical generalization and systematization, mathematical abstraction, system-oriented analysis.


Findings.
A mathematical model and optimization algorithms are proposed for using an improved methodological approach to the formation of information security of the enterprise in terms of minimizing costs and losses. This allows one not only to analyze threats and determine the weight of factors influence but also to determine effective tactics and strategies to minimize their consequences.


Originality.
During the research, a mathematical model and algorithms of optimization of losses from information threats and expenses of the enterprise for their neutralization are created. It also allows us to predict the likely consequences of probable threats. Methodological approaches to the formation of the optimal level of costs to maintain the appropriate level of security have been improved. It is shown that the analysis of information risks and threats of assessment of financial and economic stability of the enterprise to information danger should be accompanied by comparison in a dynamic mode of the corresponding economic indicators. The introduction of a methodological approach to comparing the real and optimal values of the integrated indicator of resilience allows managers to assess trends and directions of projected information threats and the need to allocate sufficient resources for protection.


Practical value.
The results of the study can be used by practitioners to implement effective management of information risks and neutralize their impact on economic indicators of the enterprise and by scientists to develop strategies and methods to neutralize information threats to financial and economic stability, production and economic stability and organizational and economic stability, the latest methods of enterprise risk management.



Keywords:
information security of the enterprise, mathematical model, algorithm, integrated indicator, enterprise stability

References.


1. Bekhter, L. (2020). Threats of information security and protection of information as a component of economic security of agricultural enterprises.Agrosvit, 12, 66-70. https://doi.org/10.32702/2306-6792.2020.12.66.

2. Popivniak, Yu.M. (2019). Cybersecurity and Protection of Accounting Data under Conditions of Modern Information Technology. Business-Inform, 8, 150-157.

3. Lapinska, Ye.I. (2019). External experience in the protection of information in the field of enterprise and its use in Ukraine. State and regions, 3(65), 174-177. https://doi.org/10.32840/1813-338X-2019-3-28.

4. Viter, S.A., & Svitlyshyn, I.I. (2017). Protection of accounting information and cyber security of the enterprise. Economy and society, 3, 497-502.

5. Shkarlet, S., Dorosh, M., Druzhynin, O., Voitsekhovska, M., & Bohdan, I. (2021). Modeling of Information Security Management System in the Project, (pp. 364-376). In Shkarlet, S., Morozov, A., & Palagin, A. (Eds) (2021). Mathematical Modeling and Simulation of Systems (MODS2020). MODS 2020. Advances in Intelligent Systems and Computing, (Vol. 1265). Springer, Cham. https://doi.org/10.1007/978-3-030-58124-4_35.

6. Prykaziuk, N., & Gumenyuk, L. (2020). Cyber-insurance as an important tool of enterprise protection in the digitization economy. Efektyvna ekonomika, 4. https://doi.org/10.32702/2307-2105-2020.4.6.

7. Sotnyk, I.N., & Zavrazhnyi, K.Yu. (2017). Approaches to provide information safety of the Industrial Internet of Things at the enterprise. Marketing and innovation management, 3, 176-178. https://doi.org/10.21272/mmi.2017.3-17.

8. Diorditsa, I. (2021). Administrative and legal content of the national cybersecurity system as a component of the national security system of Ukraine. Actual problems of domestic jurisprudence, (1), 79-83. https://doi.org/10.15421/392117.

9. Loe, M.P., Lucyshyn, W., & Zhou, L. (2018). Empirical Evidence on the Determinants of Cybersecurity Investments in Private Sector Firms. Journal of Information Security, 9, 133-153. https://doi.org/10.4236/jis.2018.92010.

10. Gordon, A., Loeb, P., & Zhou, L. (2021). Information Segmentation and Investing in Cybersecurity. Journal of Information Security, 12, 115-136. https://doi.org/10.4236/jis.2021.121006.

11. Rupra, S., & Omamo, A. (2020). A Cloud Computing Security Assessment Framework for Small and Medium Enterprises. Journal of Information Security, 11, 201-224. https://doi.org/10.4236/jis.2020.114014.

12. Savelieva, T.V., Panasko, O.M., & Prigodyuk, O.M. (2018). Analysis of methods and means to implement a risk-oriented approach in the context of providing enterprise information security. Bulletin of Cherkasy State Technological University, (1), 81-89. https://doi.org/10.24025/2306-4412.1.2018.153279.

13. Halakhov, Y.M., & Sobchuk, V.V. (2019). Development of models of cyber-attacks in the plane enterprise information security. Telecommunication and information technologies, 4, 12-24. https://doi.org/10.31673/2412-4338.2019.041224.

14. Vakun, O., Hrabchuk, I., & Zakharchuk, V. (2019). Adaptability of Software for Reporting to User Requirements. Modern Economics, 13(2019), 49-54. https://doi.org/10.31521/modecon.V13(2019)-07.

15. Maraj, A., Jakupi, G., Rogova, E., & Grajqevci, X. (2017). Testing of network security systems through DoS attacks, 2017, 6th Mediterranean Conference on Embedded Computing (MECO), Bar, 17030164. https://doi.org/10.1109/MECO.2017.7977239.

16. Lakhno, V., Kryvoruchko, O., Mohylnyi, H., Semenov, M., Kiryeyev, I., Matiievskyi, V., & Donchenko, V. (2019). Model of indicator of current risk of threats realization on the information communication system of transport. International Journal of Civil Engineering and Technology, 10(02), 1-9.

17. Hrabchuk, I.L. (2018). Organization of protection of accounting information in a hybrid war. Problems of Theory and Methodology of Accounting Control and Analysis, 3(41), 20-24. https://doi.org/10.26642/pbo-2018-3(41)-20-24.

18. Bazaluk, O., Kotenko, S., & Nitsenko, V. (2021). Entropy as an Objective Function of Optimization Multimodal Transportations. Entropy, 23(8), 946. https://doi.org/10.3390/e23080946.

19. Kotenko, S., Nitsenko, V., Hanzhurenko, I., & Havrysh, V. (2020). The Mathematical Modeling Stages of Combining the Carriage of Goods for Indefinite, Fuzzy and Stochastic Parameters. International Journal of Integrated Engineering, 12(7), 173-180. https://doi.org/10.30880/ijie.2020.12.07.019.

20. CyberEdge Group (2021). Cyberthreat Defense Report. Retrieved from https://cyber-edge.com/cdr/.

21. Symantec (2019). 2019 Internet Security Threat Report: Executive Summary, (Vol. 24). Retrieved from https://docs.broadcom.com/doc/istr-24-executive-summary-en.

22. EY Global (2018). Is cybersecurity about more than protection? Retrieved from https://www.ey.com/en_gl/consulting/global-information-security-survey-2018-2019.

 

Visitors

7564476
Today
This Month
All days
3758
86962
7564476

Guest Book

If you have questions, comments or suggestions, you can write them in our "Guest Book"

Registration data

ISSN (print) 2071-2227,
ISSN (online) 2223-2362.
Journal was registered by Ministry of Justice of Ukraine.
Registration number КВ No.17742-6592PR dated April 27, 2011.

Contacts

D.Yavornytskyi ave.,19, pavilion 3, room 24-а, Dnipro, 49005
Tel.: +38 (056) 746 32 79.
e-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.
You are here: Home Archive by issue 2022 Content №4 2022 Protection of information resources as an integral part of economic security of the enterprise