Остання редакція: 2022-02-23
Анотація
The development of the economy is carried out through the creation and development of innovative enterprises. It is they who create new technologies, new products, services and knowledge, new technologies of communication, behavior and life of both the individual and society. It must be taken into account that, while working on an innovation, some people should be excluded from admission. The aim of the work is to form requirements for the design of functionality for the development of a computer program that can be effectively used to protect the information of an innovative enterprise based on access control. The developed functionality allows optimizing information security at an innovative enterprise. In particular, it allows you to implement different methods of working with information security incidents.
Ключові слова
Посилання
REFERENCES
Decree of the President of Ukraine of August 26, 2021 № 447/2021 “Cyber Security Strategy of Ukraine. Safe cyberspace is the key to Ukraine’s successful development.” (In Ukrainian).
Shiyan, A. A., Nikiforova, L. O. Typology of Institutions – Theory: Classification of Institutions via the Methods for Transmission and Modification of Knowledge. Social Science Research Network (January 4, 2013). http://ssrn.com/abstract=2196300 or http://dx.doi.org/10.2139/ssrn.2196300.
Petrov, M. K. Language, Symbol, Culture. Moscow : Nauka, 1991. (In Russian).
Devyanin P. N. Security models of computer systems. Moscow : Academy, 2005. 144 p. (In Russian).
Grusho A. A., Timonina E. E., Primenneko E. A. Theoretical Foundations of Computer Security. Moscow : Academy, 2009. 272 p. (In Russian).
Zegzhda D. P. Information security. Moscow: MSTU named N. E. Bauman, 2010. 236 p. (In Russian).
Bogush V. M., Dovydkov O. A., Kryvutsa V. G. Theoretical foundations of secure information technology. К.: ДУІКТ, 2010. 454 с. (In Ukrainian).