THE PARADIGM OF FORMING THE PROTECTED OF THE INFORMATION SYSTEM OF A TRADING ENTERPRISE
DOI:
https://doi.org/10.32461/2226-3209.3.2018.171091Keywords:
systems, interaction, resources, information, carriers, protection, technologies.Abstract
Abstract. The article discusses the concept of organizational formation of the protected information systems trading enterprise. Reveals the content and classification of information resources, given the characteristics of the trading activities; including information about customers, employees, communication, General, financial and legal, as well as revealed the level of importance. Formulated the basic principles of formation of the protected information systems is in the aspect of specificity of trading enterprise; including continuity, comprehensiveness, consistency, the rule of law. Taking into account the specified principles is defined thematic content requirements on protected information systems; including centralization, planning, preciseness, purposefulness, activity, reliability, flexibility, originality, openness, economic efficiency. Identified recommendations to build a secure ICS: including ease of maintenance and transparency for users of the "mechanisms" of information systems protection, a minimum set of "privileges" for users, the ability to disable the "mechanisms" of information systems protection in the critical-circumstances, the independence of the "mechanisms" of protection information systems details, assumptions about the worst intentions and potential user errors, minimization of information about existing mechanisms of information systems protection. The purpose and content of the security policy of the information system as a theoretical basis of the organizational and administrative component of the protection system is considered. The conclusion is made about the universality of the presented method, for secure communication to
information systems users trading enterprise.
Key words: systems; interaction; resources; information; carriers; protection; technologies.
References
. National Standard of the Russian Federation GOST R 51303-2013 "Trade. Terms and Definitions "(approved by the order of the Federal Agency for Technical Regulation and Metrology of August 28, 2013 N 582-st) (with changes and additions). System GARANT [Electronic resource]. Available at:
http://base.garant.ru/70795476/#ixzz526vXWdl6 (accessed 29.12.2017). (in Russian)
Robert I.V. Teoriya i metodika informatizatsii obrazovaniya (psikhologo-pedagogicheskiye i tekhnolog-
icheskiye aspekty) [Theory and methodology of informatization of education (psychologo-pedagogical and technologi-
cal aspects)]. Moscow, Publishing house of the Institute of Informatization of Education of the Russian Academy of
Education Publ., 2010. 356 p.
Robert I.V. Tolkovyy slovar' terminov ponyatiynogo apparata informatizatsii obrazovaniya. [Explanatory
dictionary of terms of the conceptual apparatus of informatization of education]. Moscow, Publishing house of the Insti-
tute of Informatization of Education of the Russian Academy of Education Publ., 2009. 96 p.
Federal Law of July 27, 2006 N 152-FZ "On Personal Data". System GARANT [Electronic resource]. Available at: http://ivo.garant.ru/#/document/12148567/paragraph/24880:2 (accessed 29.12.2017). (in Russian)
Gafner V.V. Informatsionnaya bezopasnost' [ Information security]. Rostov on Don, Phoenix Publ., 2010.
p.
Cheluhin V.A. Kompleksnoye obespecheniye informatsionnoy bezopasnosti avtomatizirovannykh system [Comprehensive information security of automated systems]. Komsomolsk-on-Amur, KNAGTU, 2014. 207 p.
Downloads
Issue
Section
License
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License International CC-BY that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).