Articles
Protection of information resources as an integral part of economic security of the enterprise
- Details
- Category: Content №4 2022
- Last Updated on 29 August 2022
- Published on 30 November -0001
- Hits: 3720
Authors:
V.Chubaievskyi, orcid.org/0000-0001-8078-2652, State University of Trade and Economics, Kyiv, Ukraine, e-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.
H.Blakyta, orcid.org/0000-0002-4848-9912, State University of Trade and Economics, Kyiv, Ukraine, e-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.
O.Bogma, orcid.org/0000-0002-5637-6010, State University of Trade and Economics, Kyiv, Ukraine, e-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.
I.Shtuler, orcid.org/0000-0002-0852-8526, National Academy of Management, Kyiv, Ukraine, e-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.
T.Batrakova, orcid.org/0000-0002-5710-9416, Zaporizhzhia National University, Zaporizhzhia, Ukraine, e-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.
Naukovyi Visnyk Natsionalnoho Hirnychoho Universytetu. 2022, (4): 117 - 122
https://doi.org/10.33271/nvngu/2022-4/117
Abstract:
Purpose. To build a mathematical model and algorithms for optimizing the losses that the company may suffer from information threats and the costs necessary to prevent these losses.
Methodology. General and special methods of cognition were used to perform scientific research: comparative analysis, logical generalization and systematization, mathematical abstraction, system-oriented analysis.
Findings. A mathematical model and optimization algorithms are proposed for using an improved methodological approach to the formation of information security of the enterprise in terms of minimizing costs and losses. This allows one not only to analyze threats and determine the weight of factors influence but also to determine effective tactics and strategies to minimize their consequences.
Originality. During the research, a mathematical model and algorithms of optimization of losses from information threats and expenses of the enterprise for their neutralization are created. It also allows us to predict the likely consequences of probable threats. Methodological approaches to the formation of the optimal level of costs to maintain the appropriate level of security have been improved. It is shown that the analysis of information risks and threats of assessment of financial and economic stability of the enterprise to information danger should be accompanied by comparison in a dynamic mode of the corresponding economic indicators. The introduction of a methodological approach to comparing the real and optimal values of the integrated indicator of resilience allows managers to assess trends and directions of projected information threats and the need to allocate sufficient resources for protection.
Practical value. The results of the study can be used by practitioners to implement effective management of information risks and neutralize their impact on economic indicators of the enterprise and by scientists to develop strategies and methods to neutralize information threats to financial and economic stability, production and economic stability and organizational and economic stability, the latest methods of enterprise risk management.
Keywords: information security of the enterprise, mathematical model, algorithm, integrated indicator, enterprise stability
References.
1. Bekhter, L. (2020). Threats of information security and protection of information as a component of economic security of agricultural enterprises.Agrosvit, 12, 66-70. https://doi.org/10.32702/2306-6792.2020.12.66.
2. Popivniak, Yu.M. (2019). Cybersecurity and Protection of Accounting Data under Conditions of Modern Information Technology. Business-Inform, 8, 150-157.
3. Lapinska, Ye.I. (2019). External experience in the protection of information in the field of enterprise and its use in Ukraine. State and regions, 3(65), 174-177. https://doi.org/10.32840/1813-338X-2019-3-28.
4. Viter, S.A., & Svitlyshyn, I.I. (2017). Protection of accounting information and cyber security of the enterprise. Economy and society, 3, 497-502.
5. Shkarlet, S., Dorosh, M., Druzhynin, O., Voitsekhovska, M., & Bohdan, I. (2021). Modeling of Information Security Management System in the Project, (pp. 364-376). In Shkarlet, S., Morozov, A., & Palagin, A. (Eds) (2021). Mathematical Modeling and Simulation of Systems (MODS2020). MODS 2020. Advances in Intelligent Systems and Computing, (Vol. 1265). Springer, Cham. https://doi.org/10.1007/978-3-030-58124-4_35.
6. Prykaziuk, N., & Gumenyuk, L. (2020). Cyber-insurance as an important tool of enterprise protection in the digitization economy. Efektyvna ekonomika, 4. https://doi.org/10.32702/2307-2105-2020.4.6.
7. Sotnyk, I.N., & Zavrazhnyi, K.Yu. (2017). Approaches to provide information safety of the Industrial Internet of Things at the enterprise. Marketing and innovation management, 3, 176-178. https://doi.org/10.21272/mmi.2017.3-17.
8. Diorditsa, I. (2021). Administrative and legal content of the national cybersecurity system as a component of the national security system of Ukraine. Actual problems of domestic jurisprudence, (1), 79-83. https://doi.org/10.15421/392117.
9. Loe, M.P., Lucyshyn, W., & Zhou, L. (2018). Empirical Evidence on the Determinants of Cybersecurity Investments in Private Sector Firms. Journal of Information Security, 9, 133-153. https://doi.org/10.4236/jis.2018.92010.
10. Gordon, A., Loeb, P., & Zhou, L. (2021). Information Segmentation and Investing in Cybersecurity. Journal of Information Security, 12, 115-136. https://doi.org/10.4236/jis.2021.121006.
11. Rupra, S., & Omamo, A. (2020). A Cloud Computing Security Assessment Framework for Small and Medium Enterprises. Journal of Information Security, 11, 201-224. https://doi.org/10.4236/jis.2020.114014.
12. Savelieva, T.V., Panasko, O.M., & Prigodyuk, O.M. (2018). Analysis of methods and means to implement a risk-oriented approach in the context of providing enterprise information security. Bulletin of Cherkasy State Technological University, (1), 81-89. https://doi.org/10.24025/2306-4412.1.2018.153279.
13. Halakhov, Y.M., & Sobchuk, V.V. (2019). Development of models of cyber-attacks in the plane enterprise information security. Telecommunication and information technologies, 4, 12-24. https://doi.org/10.31673/2412-4338.2019.041224.
14. Vakun, O., Hrabchuk, I., & Zakharchuk, V. (2019). Adaptability of Software for Reporting to User Requirements. Modern Economics, 13(2019), 49-54. https://doi.org/10.31521/modecon.V13(2019)-07.
15. Maraj, A., Jakupi, G., Rogova, E., & Grajqevci, X. (2017). Testing of network security systems through DoS attacks, 2017, 6th Mediterranean Conference on Embedded Computing (MECO), Bar, 17030164. https://doi.org/10.1109/MECO.2017.7977239.
16. Lakhno, V., Kryvoruchko, O., Mohylnyi, H., Semenov, M., Kiryeyev, I., Matiievskyi, V., & Donchenko, V. (2019). Model of indicator of current risk of threats realization on the information communication system of transport. International Journal of Civil Engineering and Technology, 10(02), 1-9.
17. Hrabchuk, I.L. (2018). Organization of protection of accounting information in a hybrid war. Problems of Theory and Methodology of Accounting Control and Analysis, 3(41), 20-24. https://doi.org/10.26642/pbo-2018-3(41)-20-24.
18. Bazaluk, O., Kotenko, S., & Nitsenko, V. (2021). Entropy as an Objective Function of Optimization Multimodal Transportations. Entropy, 23(8), 946. https://doi.org/10.3390/e23080946.
19. Kotenko, S., Nitsenko, V., Hanzhurenko, I., & Havrysh, V. (2020). The Mathematical Modeling Stages of Combining the Carriage of Goods for Indefinite, Fuzzy and Stochastic Parameters. International Journal of Integrated Engineering, 12(7), 173-180. https://doi.org/10.30880/ijie.2020.12.07.019.
20. CyberEdge Group (2021). Cyberthreat Defense Report. Retrieved from https://cyber-edge.com/cdr/.
21. Symantec (2019). 2019 Internet Security Threat Report: Executive Summary, (Vol. 24). Retrieved from https://docs.broadcom.com/doc/istr-24-executive-summary-en.
22. EY Global (2018). Is cybersecurity about more than protection? Retrieved from https://www.ey.com/en_gl/consulting/global-information-security-survey-2018-2019.
Newer news items:
- Gig-economy as a safety gradient for sustainable development of the mining industry - 29/08/2022 03:58
- Digitalization approach in education based on applying the network readiness index as the universal metric - 29/08/2022 03:58
- Sustainable development of the economy in the conditions of the energy crisis - 29/08/2022 03:58
- Modeling of investment impacts on industrial enterprise profits - 29/08/2022 03:58
- Socio-economic development of enterprises in a permanent crisis - 29/08/2022 03:58
- Hypothesis of a two-level investment system and the prospects for the planned development of the socialist market economy - 29/08/2022 03:58
- Institutional support for the management of environmental-economic relations: economic and legal aspects - 29/08/2022 03:58
- Application of the wavelet transformation theory in the algorithm for constructing a quasigeoid model - 29/08/2022 03:58
Older news items:
- Application of mathematical modelling methods in oil production management - 29/08/2022 03:58
- Accounting and analytical aspects of functioning of enterprises in the context of the introduction of an artificial intelligence system - 29/08/2022 03:58
- Prediction of changes in the vegetation cover of Ukraine due to climate warming - 29/08/2022 03:58
- Problematic issues of attracting criminal responsibility for the crimes against industrial safety - 29/08/2022 03:58
- Ecological estimation of installing geothermal systems on territories of closed coal mines - 29/08/2022 03:58
- Classification of heating conditions in terms of smart control of indoor heating with the use of uncontrolled electric heaters - 29/08/2022 03:58
- The electrical power quality indicator – interference power factor - 29/08/2022 03:58
- Simulation of the process of milling and grinding cylindrical surfaces by an oriented tool in one setup - 29/08/2022 03:58
- Synthesis of phosphosulphate substance and properties of its structured mixture with quartz sand - 29/08/2022 03:58
- Determination of granulometric composition of technogenic raw materials for producing composite fuel - 29/08/2022 03:58