INFORMATION SECURITY PROVISION OF ACCOUNTING OF THE ENTERPRISE
Array
Keywords:
information, information security, threats, information leakage, accounting dataAbstract
In this article the theoretical bases of information security of accounting of enterprise are analyzed. The main types of potential threats to information security and sources of these threats are explored.
It is accounting that is the main "producer" and "distributor" of information in different areas and for different groups of users, which include clients, investors, suppliers, government organizations and other parties that are not accountants. As a whole, it can be argued that accounting today includes five main components. These include: people, operations, data, software, information technology infrastructure. Together, these five components make it possible to implement three main functions in any organization:
- collection and storage of data on the activities of the organization;
- processing data and turning it into useful information for decision making;
- proper control for the protection of assets, including data, and ensuring that reliable and adequate information is available.
The recommendations for measures to increase the level of information security and ensure the protection of accounting information have been formed. The task of providing information security must be solved systematically. This means that information security means must be applied simultaneously and under centralized control.
To protect their information resources, organizations need to implement controls oа security mechanisms designed to protect all components of the information system, including data, software, hardware and networks. Data protection technologies are based on the use of modern methods that prevent information leakage and its loss.
Today, six main methods of protection are used: obstruction, masking, regulation, management, coercion, induction. All of these techniques are aimed at building an effective technology of information security, which eliminates costs due to negligence and successfully displays various types of threats.Control measures are designed to identify problems of preventing accidental threats and intentional actions, repairing damages and troubleshooting.
References
Viter, S. A., Svetlyshyn, I. I. (2017). Protection of Accounting Information and Cyber Security of the Enterprise. Economy and Society, 11, 497-502.
Gordienko, S. B. (2013). Methods and Recommendations for Providing Information Security to a Consulting Company. Bulletin of the DUIKT, 1, 104-107.
Zakharkin, O. O. (2007). Information systems and technologies in financial institutions: abstract of lectures. Sumy: View of the SSU, 80. Retrieved from http://elkniga.info/book_188.html
Maruschak, A. I. (2011) Information and Legal Directions of Research of Information Security Problems. State Security of Ukraine,21, 92-95.
Severina, S. V. (2016) Information security and thods of information protection. Bulletin of the Zaporizhzhya National University, 1(29), 155-161.
Tsal-Tsalko, Ju. S. (2017). Accounting policy of the enterprise and its cyber security. Accounting, analysis and control in the conditions of modern concepts of management of the economic potential and market value of the enterprise: a collection of scientific works, volume IV, part I, Zhytomyr: PE "Ruta", P. 8-11.
Yasenev, V. N. (2006) Information security in economic systems: study. way. Publishing house of NNUU. Retrieved from: http://ebib.pp.ua/informatsionnaya-bezopasnost-ekonomicheskih88.html
Downloads
Published
How to Cite
Issue
Section
License
The authors who publish in this collection agree with the following terms:
• The authors reserve the right to authorship of their work and give the magazine the right to first publish this work under the terms of license CC BY-NC-ND 4.0 (with the Designation of Authorship - Non-Commercial - Without Derivatives 4.0 International), which allows others to freely distribute the published work with a mandatory reference to the authors of the original work and the first publication of the work in this magazine.
• Authors have the right to make independent extra-exclusive work agreements in the form in which they were published by this magazine (for example, posting work in an electronic repository of an institution or publishing as part of a monograph), provided that the link to the first publication of the work in this journal is maintained. .
• Journal policy allows and encourages the publication of manuscripts on the Internet (for example, in institutions' repositories or on personal websites), both before the publication of this manuscript and during its editorial work, as it contributes to the emergence of productive scientific discussion and positively affects the efficiency and dynamics of the citation of the published work (see The Effect of Open Access).