To obtain access to full text of journal and articles you must register!
- Article name
- Justification of the need to develop a methodology for choosing information security tools for the implementation of the system of information protection from unauthorized access
- Authors
- Pikov V. A., , pikov@ya.ru, Moscow Aviation Institute (National Research University), Moscow, Russia
Kaigorodova V. A., , vakajgorodova@mai.education, Moscow Aviation Institute (National Research University), Moscow, Russia
Batmanova O. V., , bat-olga@yandex.ru, Russian New University; Russian Academy of National Economy and Public Administration under the President of the Russian Federation, Moscow, Russia
- Keywords
- information protection / information / information security / corporate network / information protection methods / security policy / security protection system / information protection efficiency
- Year
- 2022 Issue 1 Pages 11 - 16
- Code EDN
- Code DOI
- 10.52190/2073-2600_2022_1_11
- Abstract
- The article is devoted to topical issues of information security of information systems for various purposes. The concept of a system for protecting information from unauthorized access is considered in detail. The analysis of approaches to the formation of a set of measures to protect information and ensure the proper level of information security is carried out. An approach to the formation of a list of actual threats to the security of information in information systems is formulated. Based on the results of the analysis, it was concluded that there is a need for further work on creating a methodology for choosing information security tools that implement a system for protecting information from unauthorized access.
- Text
- BUY for read the full text of article
- Buy
- 500.00 rub