Aspects of protection of accounting data in the conditions of use of innovation and information technologies.
Keywords:
cybersecurity, cyberenvironment, protection of accounting information, cyberthreat, cybersecurity.
Abstract
The article examines the current state of cybersecurity and identification of cyber threats in the use of credentials, the formulation of measures to minimize the risk of theft, damage or loss of confidential accounting information in the cyber environment of its use and maintenance
References
Alani M. M. Elements of Cloud Computing Security. A Survey of Key Practicalities. Switzerland : Springer, 2016. 55 p.
Kolobov L. Trade secret and the protection of trade secrets. / L. Kolobov, I. Kolesnikov // Civil law and process. 2016. No 5. S. 8–13.
Bawaneh S. S. Information security for organizations and accounting information systems. A Jordan banking sector case. International Review of Management and Business Re¬ search. 2014. Vol. 3. Issue 2. P. 1174–1188.
Von Solms R., van Niekerk J. From information security to cyber security. Computers & Security. 2013. Vol. 38. P. 97–102 URL: https://www.sciencedirect.com/science/article/ pii/S0167404813000801?via%3Dihub
Wind SA Protection of accounting information and cybersecurity of the enterprise / S.А. Wind, II Svitlyshyn // Economy and Society. 2017. Vip. 11. S. 497–502.
National cyber security strategy and 2013–2014 action plan / Ministry of Transport, Maritime Affairs and Communications; Republic of Turkey. URL: https://sherloc.unodc. org/res/cld/lessons-learned/national_cyber_security_strategy_and_2013-2014_action_plan_html/National_Cyber_Secu- rity_Strategy_and_2013-2014_Action_Plan.pdf
ISO / IEC 27001: 2013. Information Technology. Protection methods. Information security management systems. Requirements / per. from English. A. Gorbunov. URL: https://pqm-online.com/assets/files/pubs/translations/std/iso- mek-27001-2013 (rus) .pdf
Kolobov L. Trade secret and the protection of trade secrets. / L. Kolobov, I. Kolesnikov // Civil law and process. 2016. No 5. S. 8–13.
Bawaneh S. S. Information security for organizations and accounting information systems. A Jordan banking sector case. International Review of Management and Business Re¬ search. 2014. Vol. 3. Issue 2. P. 1174–1188.
Von Solms R., van Niekerk J. From information security to cyber security. Computers & Security. 2013. Vol. 38. P. 97–102 URL: https://www.sciencedirect.com/science/article/ pii/S0167404813000801?via%3Dihub
Wind SA Protection of accounting information and cybersecurity of the enterprise / S.А. Wind, II Svitlyshyn // Economy and Society. 2017. Vip. 11. S. 497–502.
National cyber security strategy and 2013–2014 action plan / Ministry of Transport, Maritime Affairs and Communications; Republic of Turkey. URL: https://sherloc.unodc. org/res/cld/lessons-learned/national_cyber_security_strategy_and_2013-2014_action_plan_html/National_Cyber_Secu- rity_Strategy_and_2013-2014_Action_Plan.pdf
ISO / IEC 27001: 2013. Information Technology. Protection methods. Information security management systems. Requirements / per. from English. A. Gorbunov. URL: https://pqm-online.com/assets/files/pubs/translations/std/iso- mek-27001-2013 (rus) .pdf
Abstract views: 0 PDF Downloads: 0
Published
2021-03-31
How to Cite
Martsenyuk , V., Sverstyuk А., Andrushchak І., Chudovets , V., & Koshelyuk , V. (2021). Aspects of protection of accounting data in the conditions of use of innovation and information technologies . COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION, (42), 172-176. https://doi.org/10.36910/6775-2524-0560-2021-42-25
Section
Computer science and computer engineering