INFORMATION SECURITY PROVISION OF ACCOUNTING OF THE ENTERPRISE

Array

Authors

  • N. Chekh O.M. Beketov National University of Urban Economy in Kharkiv
  • O. Konoplina O.M. Beketov National University of Urban Economy in Kharkiv
  • D. Shahverdyan O.M. Beketov National University of Urban Economy in Kharkiv

Keywords:

information, information security, threats, information leakage, accounting data

Abstract

In this article the theoretical bases of information security of accounting of enterprise are analyzed. The main types of potential threats to information security and sources of these threats are explored.

It is accounting that is the main "producer" and "distributor" of information in different areas and for different groups of users, which include clients, investors, suppliers, government organizations and other parties that are not accountants. As a whole, it can be argued that accounting today includes five main components. These include: people, operations, data, software, information technology infrastructure. Together, these five components make it possible to implement three main functions in any organization:

  • collection and storage of data on the activities of the organization;
  • processing data and turning it into useful information for decision making;
  • proper control for the protection of assets, including data, and ensuring that reliable and adequate information is available.

The recommendations for measures to increase the level of information security and ensure the protection of accounting information have been formed. The task of providing information security must be solved systematically. This means that information security means must be applied simultaneously and under centralized control.

To protect their information resources, organizations need to implement controls oа security mechanisms designed to protect all components of the information system, including data, software, hardware and networks. Data protection technologies are based on the use of modern methods that prevent information leakage and its loss.

Today, six main methods of protection are used: obstruction, masking, regulation, management, coercion, induction. All of these techniques are aimed at building an effective technology of information security, which eliminates costs due to negligence and successfully displays various types of threats.Control measures are designed to identify problems of preventing accidental threats and intentional actions, repairing damages and troubleshooting.

Author Biographies

N. Chekh, O.M. Beketov National University of Urban Economy in Kharkiv

Ph.D., senior lecturer of Department

O. Konoplina, O.M. Beketov National University of Urban Economy in Kharkiv

assistant of Department

D. Shahverdyan, O.M. Beketov National University of Urban Economy in Kharkiv

graduate student of Department

References

Viter, S. A., Svetlyshyn, I. I. (2017). Protection of Accounting Information and Cyber Security of the Enterprise. Economy and Society, 11, 497-502.

Gordienko, S. B. (2013). Methods and Recommendations for Providing Information Security to a Consulting Company. Bulletin of the DUIKT, 1, 104-107.

Zakharkin, O. O. (2007). Information systems and technologies in financial institutions: abstract of lectures. Sumy: View of the SSU, 80. Retrieved from http://elkniga.info/book_188.html

Maruschak, A. I. (2011) Information and Legal Directions of Research of Information Security Problems. State Security of Ukraine,21, 92-95.

Severina, S. V. (2016) Information security and thods of information protection. Bulletin of the Zaporizhzhya National University, 1(29), 155-161.

Tsal-Tsalko, Ju. S. (2017). Accounting policy of the enterprise and its cyber security. Accounting, analysis and control in the conditions of modern concepts of management of the economic potential and market value of the enterprise: a collection of scientific works, volume IV, part I, Zhytomyr: PE "Ruta", P. 8-11.

Yasenev, V. N. (2006) Information security in economic systems: study. way. Publishing house of NNUU. Retrieved from: http://ebib.pp.ua/informatsionnaya-bezopasnost-ekonomicheskih88.html

Published

2019-03-29

How to Cite

Chekh, N., Konoplina, O., & Shahverdyan, D. (2019). INFORMATION SECURITY PROVISION OF ACCOUNTING OF THE ENTERPRISE: Array. Municipal Economy of Cities, 2(148), 111–117. Retrieved from https://khg.kname.edu.ua/index.php/khg/article/view/5408