{"id":3399,"date":"2021-01-30T22:02:18","date_gmt":"2021-01-30T20:02:18","guid":{"rendered":"http:\/\/journals.khnu.km.ua\/vestnik\/?p=3399"},"modified":"2021-03-11T10:26:45","modified_gmt":"2021-03-11T08:26:45","slug":"%d0%bc%d0%b5%d1%82%d0%be%d0%b4%d0%be%d0%bb%d0%be%d0%b3%d1%96%d1%8f-%d1%96%d0%bd%d1%84%d0%be%d1%80%d0%bc%d0%b0%d1%86%d1%96%d0%b9%d0%bd%d0%be%d0%b3%d0%be-%d0%b7%d0%b0%d1%85%d0%b8%d1%81%d1%82%d1%83","status":"publish","type":"post","link":"https:\/\/journals.khnu.km.ua\/vestnik\/?p=3399","title":{"rendered":"\u041c\u0435\u0442\u043e\u0434\u043e\u043b\u043e\u0433\u0456\u044f \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u043e\u0433\u043e \u0437\u0430\u0445\u0438\u0441\u0442\u0443"},"content":{"rendered":"<p><!--more--><\/p>\n<p style=\"text-align: center;\">\u041c\u0415\u0422\u041e\u0414\u041e\u041b\u041e\u0413\u0406\u042f \u0406\u041d\u0424\u041e\u0420\u041c\u0410\u0426\u0406\u0419\u041d\u041e\u0413\u041e \u0417\u0410\u0425\u0418\u0421\u0422\u0423<\/p>\n<p style=\"text-align: center;\">METHODOLOGY OF INFORMATION PROTECTION<\/p>\n<p><strong><a href=\"http:\/\/journals.khnu.km.ua\/vestnik\/wp-content\/uploads\/2021\/01\/26-19.pdf\"><img src=\"http:\/\/journals.khnu.km.ua\/vestnik\/wp-content\/uploads\/2021\/01\/pdf.png\" \/><\/a> \u0421\u0442\u043e\u0440\u0456\u043d\u043a\u0438<\/strong><strong>: 130-134. \u041d\u043e\u043c\u0435\u0440: \u2116<\/strong><strong>4, \u0422\u043e\u043c 1, 2020 (28<\/strong><strong>4)<\/strong><\/p>\n<p><strong>\u0410\u0432\u0442\u043e\u0440\u0438:<\/strong><br \/>\n\u041c\u0415\u0419\u0428 \u0410. \u0412., \u041c\u0410\u0422\u0412\u0406\u0419\u0427\u0423\u041a \u041e. \u0412.<br \/>\n\u0425\u043c\u0435\u043b\u044c\u043d\u0438\u0446\u044c\u043a\u0438\u0439 \u043d\u0430\u0446\u0456\u043e\u043d\u0430\u043b\u044c\u043d\u0438\u0439 \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442<\/p>\n<p>MEISH A., MATVIYCHUK O.<br \/>\nKhmelnytskyi National University<\/p>\n<p><strong>DOI<\/strong><strong>:<\/strong>\u00a0<a href=\"https:\/\/www.doi.org\/10.31891\/2307-5740-2020-284-4-24\">https:\/\/www.doi.org\/10.31891\/2307-5740-2020-284-4-24<\/a><br \/>\n<strong>\u041d\u0430\u0434\u0456\u0439\u0448\u043b\u0430 \/ Paper received:<\/strong> 17.08.2020<br \/>\n<strong>\u041d\u0430\u0434\u0440\u0443\u043a\u043e\u0432\u0430\u043d\u0430 \/ Paper Printed :<\/strong> 30.09.2020<\/p>\n<p style=\"text-align: center;\"><strong>\u0410\u043d\u043e\u0442\u0430\u0446\u0456\u044f \u043c\u043e\u0432\u043e\u044e \u043e\u0440\u0438\u0433\u0456\u043d\u0430\u043b\u0443<\/strong><\/p>\n<p>\u0423 \u0441\u0442\u0430\u0442\u0442\u0456 \u043f\u0440\u043e\u0430\u043d\u0430\u043b\u0456\u0437\u043e\u0432\u0430\u043d\u043e \u0442\u0430 \u0432\u0438\u0437\u043d\u0430\u0447\u0435\u043d\u043e \u043e\u0441\u043d\u043e\u0432\u043d\u0456 \u0437\u0430\u0433\u0440\u043e\u0437\u0438 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u043e-\u043a\u043e\u043c\u0443\u043d\u0456\u043a\u0430\u0442\u0438\u0432\u043d\u0456\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u0456 \u043f\u0456\u0434\u043f\u0440\u0438\u0454\u043c\u0441\u0442\u0432\u0430 \u0442\u0430 \u0457\u0445 \u0432\u043f\u043b\u0438\u0432 \u043d\u0430 \u0434\u0456\u044f\u043b\u044c\u043d\u0456\u0441\u0442\u044c \u043f\u0456\u0434\u043f\u0440\u0438\u0454\u043c\u0441\u0442\u0432\u0430. \u041d\u0430\u0432\u0435\u0434\u0435\u043d\u043e \u0447\u0456\u0442\u043a\u0456 \u0437\u0430\u0445\u043e\u0434\u0438 \u0437\u0430\u0434\u043b\u044f \u0443\u043d\u0438\u043a\u043d\u0435\u043d\u043d\u044f \u0440\u0435\u0439\u0434\u0435\u0440\u0441\u0442\u0432\u0430 \u0442\u0430 \u0432\u0438\u0442\u043e\u043a\u0443 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0457. \u041f\u0440\u043e\u0430\u043d\u0430\u043b\u0456\u0437\u043e\u0432\u0430\u043d\u0456 \u0442\u0435\u0440\u043c\u0456\u043d\u0438: \u0440\u0435\u0439\u0434\u0435\u0440\u0441\u0442\u0432\u043e, \u0448\u0430\u0445\u0440\u0430\u0439\u0441\u0442\u0432\u043e, \u043d\u0430\u0434\u0430\u043d\u0430 \u0457\u0445 \u0445\u0430\u0440\u0430\u043a\u0442\u0435\u0440\u0438\u0441\u0442\u0438\u043a\u0430 \u0442\u0430 \u0432\u0430\u0440\u0456\u0430\u043d\u0442\u0438 \u0437\u043c\u0435\u043d\u0448\u0435\u043d\u043d\u044f \u0457\u0445 \u043d\u0430 \u043f\u0456\u0434\u043f\u0440\u0438\u0454\u043c\u0441\u0442\u0432\u0456.<br \/>\n<strong>\u041a\u043b\u044e\u0447\u043e\u0432\u0456 \u0441\u043b\u043e\u0432\u0430:<\/strong> \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u0430 \u0431\u0435\u0437\u043f\u0435\u043a\u0430, \u0440\u0435\u0439\u0434\u0435\u0440\u0441\u0442\u0432\u043e, \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u0456 \u0441\u0438\u0441\u0442\u0435\u043c\u0438, \u0448\u0430\u0445\u0440\u0430\u0439\u0441\u0442\u0432\u043e, \u0437\u0430\u0445\u0438\u0441\u0442 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0457.<\/p>\n<p style=\"text-align: center;\"><strong>\u0420\u043e\u0437\u0448\u0438\u0440\u0435\u043d\u0430 \u0430\u043d\u043e\u0442\u0430\u0446\u0456\u044f \u0430\u043d\u0433\u043b\u0456\u0439\u0441\u044c\u043a\u043e\u044e \u043c\u043e\u0432\u043e\u044e<\/strong><\/p>\n<p>As you know, the larger the business, the more difficult it becomes to control. In the beginning, its owner or director can keep everything under control, and with its development it becomes difficult for one person to organize all the processes. What aspects should be paid attention to, what past should be excluded, and what is new should be added to the enterprise, what accents should be placed in the control processes &#8211; we will reveal in this article.<br \/>\nAny business is a set of certain resources. These include those that have a material expression (real estate, equipment, corporate rights) and those that are expressed in intangible form (information about the activities of the enterprise, its trade secrets).<br \/>\nQualitatively formed processes are the key to the success of any company.<br \/>\nThe development of a modern economy based on the use of new technologies, the creation of new materials, the analysis of large data sets, the development of new management systems leads to a change the principles of competition. Competition has gone beyond traditional notions of competition in existing markets. That&#8217;s why the purpose of this article is to convey to the head that if his company is promising, it has income, it is already at risk. Raiders have a number of policies, moves that will illegally or even legally leave the company without income. In this article, we have presented recommendations, a number of actions to modernize and move away from the established past, complexes and structures that the company should contain. In the article the problems concerning the directions of the state policy in the field of development of information security are investigated. Based on the analysis of scientific literature in the work it is noted that information security is a state of protection of the individual, society, state from information that is harmful or illegal, from information that has a negative impact on the consciousness of the individual, hinders the sustainable development of the individual, society and state. Thus, before the owner of the enterprise before its immediate opening (the best option) or during the operation of the enterprise there are a number of tasks to which he cannot be irresponsible.<br \/>\n<strong>Keywords:<\/strong> information security, raiding, information systems, fraud, information protection.<\/p>\n<p style=\"text-align: center;\"><strong>References<\/strong><\/p>\n<ol>\n<li>Hitarova I. Yu. Duhovnaya zhizn obshestva kak obekt informacionnoj bezopasnosti \/ I.Yu. Hitarova \/\/ Etnosocium i mezhnacionalnaya kultura. \u2013 2008. \u2013 \u2116 6. \u2013 S. 37\u201347.<\/li>\n<li>Konstytutsiia Ukrainy : Osnovnyi Zakon Ukrainy vid 28.06.1996 \u2116 254k\/96-VR. \u2013 URL : http:\/\/zakon3.rada.gov.ua\/ laws\/show\/254%D0%BA\/96-%D0%B2%D1%80 (data zvernennia: 02.07.2019).<\/li>\n<li>Tsymbaliuk V. Okremi pytannia shchodo vyznachennia katehorii \u00abinformatsiina bezpeka\u00bb u normatyvno-pravovomu aspekti \/ V.\u00a0Tsymbaliuk \/\/ Pravove, normatyvne ta metrolohichne zabezpechennia systemy zakhystu informatsii v Ukraini : naukovo-tekhnichnyi zbirnyk. \u2013 K., 2004. \u2013 S. 30\u201333.<\/li>\n<li>Krasnostup M. D. Informatsiina bezpeka Ukrainy: sutnist ta problemy \/ M.D. Krasnostup \/\/ Informatsiini tekhnolohii ta zakhyst informatsii. \u2013 1999. \u2013 \u2116 1. \u2013 S. 108\u2013110.<\/li>\n<li>Baranov A. A. Konceptualnye voprosy informacionnoj bezopasnosti Ukrainy \/ A.A. Baranov \/\/ Normativno-pravovaya baza zashity informacii : sbornik materialov. \u2013 K., 1997. \u2013 S. 53\u201358.<\/li>\n<li>Zghurovskyi M. Z. Problemy informatsiinoi bezpeky v Ukraini, shliakhy yikh vyrishennia \/ M.Z. Zghurovskyi \/\/ Pravove, normatyvne ta metrolohichne zabezpechennia systemy zakhystu informatsii v Ukraini : naukovo-tekhnichnyi zbirnyk. \u2013 K., 2000. \u2013 S. 10\u201314.<\/li>\n<li>Vus M. A. Informacionnoe obshestvo. Informacionnoe pravo. Informacionnaya bezopasnost \/ M.A. Vus, Yu.M. Nesterov \/\/ Aktualnye problemy bezopasnosti informacionnogo prostranstva : materialy Vserossijskoj nauchno-prakticheskoj konferencii. SPb, 5-8 oktyabrya 1999 g. \u2013 SPb, 1999. \u2013 S. 19-20.<\/li>\n<li>Lipkan V. A. Informatsiina bezpeka Ukrainy v umovakh yevrointehratsii : [navchalnyi posibnyk] \/ V.A. Lipkan. \u2013 K. : KNT, 2006. \u2013 280 s.<\/li>\n<li>Danylian O. H. Natsionalna bezpeka Ukrainy: struktura ta napriamky realizatsii : [navchalnyi posibnyk] \/ Danylian O.H., Dzoban\u00a0O.P., Panov M.I. \u2013 Kh. : Folio, 2002. \u2013 285 s.<\/li>\n<\/ol>\n<p>10\u00a0Petrakov M. V. Ob osnovnyh napravleniyah obespecheniya informacionnoj sostavlyayushej v sisteme nacionalnoj bezopasnosti \/ M.V. Petrakov \/\/ Materialy nauchnoj konferencii \u00abKonceptualnye problemy informacionnoj bezopasnosti v soyuze Rossii i Belarusi\u00bb. \u2013 SPb, 2000. \u2013 URL : http:\/\/jurfak.spb.ru\/ conference\/2001.htm (data zvernennya: 02.07.2019<\/p>\n<ol start=\"11\">\n<li>Osnovnye ponyatiya zashity informacii i informacionnoj bezopasnosti. \u2013 URL : http:\/\/ypn.ru\/102\/introduction-to-information-protection-and-information-security\/ (data zvernennya: 02.07.2019).<\/li>\n<li>Astahova L. V. Sushnost ponyatiya \u00abKultura informacionnoj bezopasnosti\u00bb i ee formirovanie u studentov vuza \/ L.V. Astahova \/\/ Ekonomika. Informatika. Bezopasnost : sb. nauch. tr. Mezhdunar. nauch.-prakt. konf., 2007 \/ nauch. red. V. A. Kiseleva, L. V. Astahova. \u2013 Chelyabinsk : Izd-vo YuUrGU, 2007. \u2013 S. 93\u201399.<\/li>\n<li>Horbatiuk O.M. Suchasnyi stan ta problemy informatsiinoi bezpeky Ukrainy na rubezhi stolit \/ O.M. Horbatiuk \/\/ Visnyk Kyivskoho universytetu imeni T. Shevchenka. \u2013 1999. \u2013 Vyp. 14: Mizhnarodni vidnosyny. \u2013 S. 46\u201348.<\/li>\n<li>Bohush V. Informatsiina bezpeka derzhavy \/ V. Bohush, O. Yudin ; [hol. red. Yu.O. Shpak]. \u2013 K. : \u00abMK-Pres\u00bb, 2005. \u2013 432 s.<\/li>\n<li>Sorokivska O.A. Informatsiina bezpeka pidpryiemstva: novi zahrozy ta perspektyvy \/ O.A. Sorokivska, V.L. Hevko \/\/ Visnyk Khmelnytskoho natsionalnoho universytetu. \u2013 2010. \u2013 \u2116 2. \u2013 T. 2. \u2013 S. 32\u201335.<\/li>\n<li>Lytvynov V.V. Modeliuvannia ta analiz bezpeky rozpodilenykh informatsiinykh system : navch. pos. [dlia stud. spets. 121 \u00abInzheneriia prohramnoho zabezpechennia\u00bb] \/ V.V. Lytvynov, V.V. Kazymyr, I.V. Stetsenko ta in. \u2013 Chernihiv : Chernihiv. nats. tekhnol. un-t, 2016. \u2013 254 s.<\/li>\n<li>Pro osnovni zasady rozvytku informatsiinoho suspilstva v Ukraini na 2007\u20132015 rr. : zakon Ukrainy vid 09.01.2007. \u2013 URL : http:\/\/zakon3.rada.gov.ua\/ laws\/show\/537-16<\/li>\n<li>Pro sluzhbu bezpeky Ukrainy : zakon Ukrainy vid 25.03.1992. \u2013 URL : <a href=\"http:\/\/zakon4.rada.gov.ua\/laws\/show\/2229-12\">http:\/\/zakon4.rada.gov.ua\/laws\/show\/2229-12<\/a><\/li>\n<li>Subbot A. Informatsiina bezpeka suspilstva \/ A. Subbot \/\/ Viche. \u2013 2015. \u2013 \u2116 8. \u2013 S. 29\u201331.<\/li>\n<li>Dolzhenko K. I. Normatyvno-pravove rehuliuvannia informatsiinoi bezpeky rehionu \/ K. I. Dolzhenko \/\/ Pravo i Bezpeka. \u2013 2014. \u2013 \u2116 3. \u2013 S. 43\u201348.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[9],"tags":[],"_links":{"self":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/3399"}],"collection":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3399"}],"version-history":[{"count":3,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/3399\/revisions"}],"predecessor-version":[{"id":4346,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/3399\/revisions\/4346"}],"wp:attachment":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3399"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3399"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3399"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}