Научная статья на тему 'MECHANISMS OF PROVISION OF INFORMATION SECURITY AS A FACTOR OF ECONOMIC SECURITY OF SMALL AND PRIVATE BUSINESS'

MECHANISMS OF PROVISION OF INFORMATION SECURITY AS A FACTOR OF ECONOMIC SECURITY OF SMALL AND PRIVATE BUSINESS Текст научной статьи по специальности «СМИ (медиа) и массовые коммуникации»

CC BY
56
66
i Надоели баннеры? Вы всегда можете отключить рекламу.
Ключевые слова
INFORMATION SECURITY / SYSTEM OF INFORMATION SECURITY / REQUIREMENTS TO SYSTEM OF INFORMATION SECURITY

Аннотация научной статьи по СМИ (медиа) и массовым коммуникациям, автор научной работы — Mamatkhanov Akmalkhon Avazkhonovich, Nuriddinova Mokhinabonu Shakhobiddin Qizi, Nuruddinova Adiba Gazievna

In the article there analyzed systematic approach in provision of information security (IS) of entities of small and private business. There suggested mechanisms of information security in companies. There systematized requirements to the system of information security.

i Надоели баннеры? Вы всегда можете отключить рекламу.
iНе можете найти то, что вам нужно? Попробуйте сервис подбора литературы.
i Надоели баннеры? Вы всегда можете отключить рекламу.

Текст научной работы на тему «MECHANISMS OF PROVISION OF INFORMATION SECURITY AS A FACTOR OF ECONOMIC SECURITY OF SMALL AND PRIVATE BUSINESS»

MECHANISMS OF PROVISION OF INFORMATION SECURITY AS A FACTOR OF ECONOMIC SECURITY OF SMALL AND PRIVATE BUSINESS

1Senior Lecturer Mamatkhanov Akmalkhon Avazkhonovich 2Student Nuriddinova Mokhinabonu Shakhobiddin Qizi 1PhD, associate professor Nuruddinova Adiba Gazievna

1 "Labour Economics and Management " department of Tashkent Branch of Russian Economic University after G.V. Plekhanov 2Tashkent University of Information Technologies

Abstract. In the article there analyzed systematic approach in provision of information security (IS) of entities of small and private business. There suggested mechanisms of information security in companies. There systematized requirements to the system of information security.

Keywords: information security, system of information security, requirements to system of information security.

Economic security of business entity is characterized by the presence of stable income that allows you to maintain a high level of profitability of the subject, not only for now but also in foreseeable future. In modern conditions of aggressive market economy provision of economic security of business entity depends on competently formed system of information security.

Information security, especially business information is becoming more vulnerable with globalization and development of integration processes. There turn up new threats of information and breakers of information security. [1]

Now the information is a commodity that has its price, and sometimes quite high, and losses associated with damage to the information can be very high.

Information security is important for all business firms at present, regardless of size and scope of activity, and patterns of ownership as well. If we talk about subjects of small and private business, the issues of information security is not paid too much attention. As a rule, small companies use separated solutions relating to the protection of one or two types of information threats, and don't settle information security issues systematically. Therefore, it is small businesses are a major target for existing information security threats as large companies are well protected from these threats.

As already mentioned, it is necessary to approach systematically to information security. It is not enough to apply narrowly focused "point" measures. Therefore, each company must develop and implement their information security policies, based on the characteristics of its business. Information Security Systems can be developed both by the specialists of the company and third-party forces. Today in market there are companies that specialize in design, development, implementation and maintenance of solutions for information security of any complexity and scale.

Many of these companies offer standard solutions implementation of IS systems that provide: protection of remote access to information resources, protection of information portal, protection of operating automated systems at the enterprise, protection from insiders, protection of personal data, implementation and maintenance of management systems of incidents and events of information security (SIEM-systems), content filtering, information resources security analysis system, etc.. A small company is not always able to use ready standard decision. Reasons for the features of functioning of the company are in specificity of the field and activities and others. But if you use services of the company for developing their own individual information security systems, these solutions will be even pricier.

To ensure comprehensive approach to organization of information security of the company, there made the following requirements to the system of information security [1]:

1. Regulation of activities of the enterprise, appointment and allocation of responsibilities of the staff.

2. Protection from unauthorized access to the information.

3. Protection of payment process (if any).

4. Protection of information processes in which personal data are processed.

5. Use of Internet resources.

WORLD SCIENCE

№ 7(11), Vol.1, July 2016

33

6. Anti-virus protection.

7. Use of cryptographic protection of information (if required for enterprise operation).

Each company submits a claim on information security, based on the specificity of used and

processed information. Competent information security policy should not affect the efficiency of key business processes of the company, but at the same time it should provide maximum protection of the company.

Nowadays, there is a large arsenal of techniques and mechanisms of information security: means of identification and authentication of users, means of encryption of information stored in computers and transmitted over networks, firewalls, means of content filtering, means of anti-virus protection, systems of revealing vulnerability of networks and analyzers of network attacks [2].

Each of these tools can be used both independently and in the integration with others. It makes possible to create the system of information security for networks of any complexity and configuration of platform agnostic. The staff of the company is responsible for protection of Information security; they must monitor real risks and threats of information security and take rational and effective measures to protect it. This is what provides complex (system) approach to the organization of information security of the company. Satisfaction of all above-listed requirements draws the essence of systematic approach to ensure information security of the enterprise.

REFERENCES

1. Kamskova I.D. Requirements to the systems of information security in financial and credit institutions // Actual problems of operation of business: financial and economic aspect. Materials of III Russian scientific and practical conference (March 1-2, 2012). - Nizhny Novgorod: NKI, 2012. - P. 101-106.

2. Gulomov Sh.R., Nuriddinova M.Sh., Nuruddinova A.G. Settings firewalls to implement special filtering mode. "International scientific review". 2016. №5 (15), XIII International scientific and practical conference "International scientific review of the problems and prospects of modern science and education" Chicago. USA, April, 21-22 2016. P. 34-39.

СВОБОДНЫЕ ЭКОНОМИЧЕСКИЕ ЗОНЫ, КАК СРЕДА ДЛЯ РАЗВИТИЯ ИННОВАЦИОННЫХ КЛАСТЕРОВ

Mg. oec. Зайцева Е. И. докторантка Балтийской Международной Академии, Латвия

Abstract. The necessity for the survival of Latvia on the EU economic space dictates the importance of using modern methods of supporting the economic development of the country. In this present case consider the combination of the free economic zones with the development of innovation clusters what will help to improve the economic position of the state.

Keywords: free economic zones, innovation cluster, the economic development, Latvia.

Свободные экономические зоны (СЭЗ) многие рассматривают как нововведения развивающихся стран последнего десятилетия. Однако первые СЭЗ появились еще три столетия назад - на Гибралтаре в 1704 году, в 1819 году в Сингапуре и в 1848 году в Гонконге. Сегодня в мире функционирует несколько тысяч свободных экономических зон [1].

Интерес иностранных инвесторов к свободным экономическим зонам - это существенные льготы. К наиболее распространенным льготам и привилегиям, действующим в СЭЗ, относятся [2]:

- налоговые и таможенные льготы;

- доступ к национальному и региональным рынкам;

- обеспечение более низких производственных затрат, в том числе за счет более дешевой рабочей силы;

- возможность финансирования по сниженным процентным ставкам.

За счет ведения бизнеса в особых экономических зонах снижение издержек резидентов ОЭЗ в среднем составляет порядка 15-20 % от общего объем их затрат. Мировой опыт показывает, что по промышленно-производственным особым экономическим зонам период возврата денежных средств составляет 7-8 лет [3]. Примеры зарубежныого опыта развития инновационной экономики при помощи создания СЭЗ: тайваньский технопарк Синчжу - лидер тайваньской ИТ-индустрии, включающий 384 компании и более 115 тысяч сотрудников, где годовой оборот составляет 30 миллиардов долларов; создание полюсов конкурентоспособности

34 № 7(11 ), Vol.1, July 2016

WORLD SCIENCE

i Надоели баннеры? Вы всегда можете отключить рекламу.