About the Journal

Collection "Bulletin of PSTU" Series: Economic Sciences   

ISSN: 2225 - 6725

Founder: State Higher Educational Institution "Pryazovskyi State Technical University" http://www.pstu.edu 

Year of establishment: 1995

The collection contains articles that summarize the results of scientific research by employees of higher educational institutions of Ukraine, academic and sectoral scientific organizations, leading enterprises of the leading industries of the country, employees of international, state, and regional organizations, authorities dealing with the development of theoretical and practical aspects of economics and intellectual property. The collection is intended for scientists, specialists who study and research economic processes, lecturers, postgraduates, and students.

The collection is registered as a print media outlet. Decision No. 1821 of the National Council of Ukraine on Television and Radio Broadcasting dated 21.12.2023 (Protocol No. 31)

Address:

Dmytro Yavornytsky Ave., 19,

Building 12, Room 314

SHEI "PSTU"

Dnipro

49005

E-mail: vestnik.pstu@gmail.com

Reference phone numbers:

098258 94 47  Larysa Hryhorivna Kapranova, Deputy Editor-in-Chief

https://scholar.google.com.ua/citations?hl=uk&user=tb46RAoAAAAJ&view_op=list_works&authuser=7

https://portal.issn.org/resource/ISSN/2225-6725#

 

Announcements

Current Issue

Vol. 1 No. 40 (2024): REPORTER OF THE PSTU. Section: Economic sciences
					View Vol. 1 No. 40 (2024): REPORTER OF THE PSTU. Section: Economic sciences
Published: 2024-11-21

Статті

  • Information security audit

    Olena Khadzhynova, Mariia Khadzhynova
    9-19

    The article defines that information security auditing aims to identify and assess potential issues and vulnerabilities in the operation of an enterprise's information systems. The essence and scope of different types of information security audits for enterprises are explored. A sequence for conducting an information security audit is proposed, highlighting its stages, each aimed at ensuring the protection of the enterprise's information system from unauthorized access while maintaining business continuity.

    DOI: https://doi.org/10.31498/2225-6725.40.2024.315807
View All Issues