{"id":3509,"date":"2021-01-30T22:44:26","date_gmt":"2021-01-30T20:44:26","guid":{"rendered":"http:\/\/journals.khnu.km.ua\/vestnik\/?p=3509"},"modified":"2021-05-18T09:25:31","modified_gmt":"2021-05-18T06:25:31","slug":"%d0%b0%d0%ba%d1%82%d1%83%d0%b0%d0%bb%d1%8c%d0%bd%d1%96-%d0%b0%d1%81%d0%bf%d0%b5%d0%ba%d1%82%d0%b8-%d0%b7%d0%b0%d1%85%d0%b8%d1%81%d1%82%d1%83-%d1%96%d0%bd%d1%84%d0%be%d1%80%d0%bc%d0%b0%d1%86%d1%96","status":"publish","type":"post","link":"https:\/\/journals.khnu.km.ua\/vestnik\/?p=3509","title":{"rendered":"\u0410\u043a\u0442\u0443\u0430\u043b\u044c\u043d\u0456 \u0430\u0441\u043f\u0435\u043a\u0442\u0438 \u0437\u0430\u0445\u0438\u0441\u0442\u0443 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u0438\u0445 \u0440\u0435\u0441\u0443\u0440\u0441\u0456\u0432 \u0431\u0456\u0437\u043d\u0435\u0441-\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440"},"content":{"rendered":"<p><!--more--><\/p>\n<p style=\"text-align: center;\">\u0410\u041a\u0422\u0423\u0410\u041b\u042c\u041d\u0406 \u0410\u0421\u041f\u0415\u041a\u0422\u0418 \u0417\u0410\u0425\u0418\u0421\u0422\u0423 \u0406\u041d\u0424\u041e\u0420\u041c\u0410\u0426\u0406\u0419\u041d\u0418\u0425 \u0420\u0415\u0421\u0423\u0420\u0421\u0406\u0412 \u0411\u0406\u0417\u041d\u0415\u0421-\u0421\u0422\u0420\u0423\u041a\u0422\u0423\u0420<\/p>\n<p style=\"text-align: center;\">CURRENT ASPECTS OF PROTECTION INFORMATION RESOURCES OF BUSINESS STRUCTURES<\/p>\n<p><strong><a href=\"http:\/\/journals.khnu.km.ua\/vestnik\/wp-content\/uploads\/2021\/01\/46-10.pdf\"><img src=\"http:\/\/journals.khnu.km.ua\/vestnik\/wp-content\/uploads\/2021\/01\/pdf.png\" \/><\/a> \u0421\u0442\u043e\u0440\u0456\u043d\u043a\u0438: 238-242. \u041d\u043e\u043c\u0435\u0440: \u21165, 2020 (286)<\/strong><\/p>\n<p><strong>\u0410\u0432\u0442\u043e\u0440\u0438:<\/strong><br \/>\n\u042f\u0420\u0415\u041c\u041a\u041e \u0421.\u043c\u0410., \u041a\u0423\u0417\u042c\u041c\u0406\u041d\u0410 \u041e. \u041c.<br \/>\n\u0412\u0456\u043d\u043d\u0438\u0446\u044c\u043a\u0438\u0439 \u0442\u043e\u0440\u0433\u043e\u0432\u0435\u043b\u044c\u043d\u043e-\u0435\u043a\u043e\u043d\u043e\u043c\u0456\u0447\u043d\u0438\u0439 \u0456\u043d\u0441\u0442\u0438\u0442\u0443\u0442<\/p>\n<p>YAREMKO S., \u041aUZMINA \u041e.<br \/>\nVinnytsia Institute of Trade and Economics<\/p>\n<p><strong>\u00a0<\/strong><strong>DOI:<\/strong>\u00a0<a href=\"https:\/\/www.doi.org\/10.31891\/2307-5740-2020-286-5-44\">https:\/\/www.doi.org\/10.31891\/2307-5740-2020-286-5-44<\/a><br \/>\n<strong>\u041d\u0430\u0434\u0456\u0439\u0448\u043b\u0430 \/ Paper received :<\/strong> 20.09.2020<br \/>\n<strong>\u041d\u0430\u0434\u0440\u0443\u043a\u043e\u0432\u0430\u043d\u0430 \/ Paper Printed :<\/strong> 05.11.2020<\/p>\n<p style=\"text-align: center;\"><strong>\u0410\u043d\u043e\u0442\u0430\u0446\u0456\u044f \u043c\u043e\u0432\u043e\u044e \u043e\u0440\u0438\u0433\u0456\u043d\u0430\u043b\u0443<\/strong><\/p>\n<p>\u0412 \u0441\u0442\u0430\u0442\u0442\u0456 \u0440\u043e\u0437\u0433\u043b\u044f\u043d\u0443\u0442\u043e \u043e\u0441\u043d\u043e\u0432\u043d\u0456 \u043f\u043e\u043d\u044f\u0442\u0442\u044f \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u043e\u0457 \u0431\u0435\u0437\u043f\u0435\u043a\u0438; \u0434\u043e\u0441\u043b\u0456\u0434\u0436\u0435\u043d\u043e \u0434\u0436\u0435\u0440\u0435\u043b\u0430 \u0437\u0430\u0433\u0440\u043e\u0437 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u0438\u043c \u0440\u0435\u0441\u0443\u0440\u0441\u0430\u043c \u043f\u0456\u0434\u043f\u0440\u0438\u0454\u043c\u0441\u0442\u0432\u0430, \u0437\u043e\u043a\u0440\u0435\u043c\u0430 \u0430\u043d\u0442\u0440\u043e\u043f\u043e\u0433\u0435\u043d\u043d\u0438\u0445, \u0442\u0435\u0445\u043d\u043e\u0433\u0435\u043d\u043d\u0438\u0445 \u0442\u0430 \u0441\u0442\u0438\u0445\u0456\u0439\u043d\u0438\u0445; \u0432\u0438\u0441\u0432\u0456\u0442\u043b\u0435\u043d\u043e \u043e\u0441\u043e\u0431\u043b\u0438\u0432\u043e\u0441\u0442\u0456 \u043a\u043e\u043c\u043f\u043b\u0435\u043a\u0441\u043d\u043e\u0457 \u0441\u0438\u0441\u0442\u0435\u043c\u0438 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u043e\u0457 \u0431\u0435\u0437\u043f\u0435\u043a\u0438; \u0437\u0434\u0456\u0439\u0441\u043d\u0435\u043d\u043e \u0430\u043d\u0430\u043b\u0456\u0442\u0438\u0447\u043d\u0438\u0439 \u043e\u0433\u043b\u044f\u0434 \u043d\u0430\u0439\u0431\u0456\u043b\u044c\u0448 \u043f\u043e\u0448\u0438\u0440\u0435\u043d\u0438\u0445 \u0443 \u0441\u0432\u0456\u0442\u0456 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c \u0434\u043b\u044f \u0437\u0430\u0445\u0438\u0441\u0442\u0443 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u043e\u0457 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0457.<br \/>\n\u0426\u0435 \u0434\u043e\u0437\u0432\u043e\u043b\u0438\u043b\u043e \u0432\u0438\u044f\u0432\u0438\u0442\u0438 \u043f\u0435\u0440\u0435\u0432\u0430\u0433\u0438 \u0456 \u043d\u0435\u0434\u043e\u043b\u0456\u043a\u0438 \u0441\u0443\u0447\u0430\u0441\u043d\u0438\u0445 \u0437\u0430\u0441\u043e\u0431\u0456\u0432 \u0437\u0430\u0445\u0438\u0441\u0442\u0443 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u0438\u0445 \u0440\u0435\u0441\u0443\u0440\u0441\u0456\u0432 \u0442\u0430 \u0440\u043e\u0437\u0440\u043e\u0431\u0438\u0442\u0438 \u0440\u044f\u0434 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0456\u0439 \u0449\u043e\u0434\u043e \u0443\u0434\u043e\u0441\u043a\u043e\u043d\u0430\u043b\u0435\u043d\u043d\u044f \u043e\u0440\u0433\u0430\u043d\u0456\u0437\u0430\u0446\u0456\u0457 \u0437\u0430\u0445\u0438\u0441\u0442\u0443 \u043f\u0456\u0434\u043f\u0440\u0438\u0454\u043c\u043d\u0438\u0446\u044c\u043a\u043e\u0457 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0457.<br \/>\n\u0412 \u0446\u0456\u043b\u043e\u043c\u0443, \u043c\u043e\u0436\u043d\u0430 \u0432\u0456\u0434\u0437\u043d\u0430\u0447\u0438\u0442\u0438, \u0449\u043e \u0440\u043e\u0437\u0440\u043e\u0431\u043b\u0435\u043d\u043d\u044f \u0442\u0430 \u0432\u043f\u0440\u043e\u0432\u0430\u0434\u0436\u0435\u043d\u043d\u044f \u043c\u0435\u0442\u043e\u0434\u0456\u0432 \u0442\u0430 \u0437\u0430\u0441\u043e\u0431\u0456\u0432 \u0437\u0430\u0445\u0438\u0441\u0442\u0443 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u0438\u0445 \u0440\u0435\u0441\u0443\u0440\u0441\u0456\u0432 \u0454 \u0431\u0435\u0437\u0443\u043c\u043e\u0432\u043d\u043e \u043e\u0434\u043d\u0438\u043c \u0456\u0437 \u0432\u0430\u0436\u043b\u0438\u0432\u0438\u0445 \u043f\u0438\u0442\u0430\u043d\u044c \u0434\u043b\u044f \u0431\u0456\u0437\u043d\u0435\u0441-\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440, \u043e\u0441\u043a\u0456\u043b\u044c\u043a\u0438 \u0432\u043e\u043d\u0438 \u0454 \u0441\u0443\u0447\u0430\u0441\u043d\u0438\u043c \u0442\u0430 \u0435\u0444\u0435\u043a\u0442\u0438\u0432\u043d\u0438\u043c \u0437\u0430\u0441\u043e\u0431\u043e\u043c \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0435\u043d\u043d\u044f \u0446\u0456\u043b\u0456\u0441\u043d\u043e\u0441\u0442\u0456, \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u043e\u0441\u0442\u0456 \u0442\u0430 \u043a\u043e\u043d\u0444\u0456\u0434\u0435\u043d\u0446\u0456\u0439\u043d\u043e\u0441\u0442\u0456 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u0438\u0445 \u043f\u043e\u0442\u043e\u043a\u0456\u0432 \u043f\u0456\u0434\u043f\u0440\u0438\u0454\u043c\u0441\u0442\u0432\u0430.<br \/>\n<strong>\u041a\u043b\u044e\u0447\u043e\u0432\u0456 \u0441\u043b\u043e\u0432\u0430:<\/strong> \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u0430 \u0431\u0435\u0437\u043f\u0435\u043a\u0430, \u0441\u0443\u0431\u2019\u0454\u043a\u0442 \u0431\u0435\u0437\u043f\u0435\u043a\u0438, \u0431\u0456\u0437\u043d\u0435\u0441-\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430, \u0434\u0436\u0435\u0440\u0435\u043b\u043e \u0437\u0430\u0433\u0440\u043e\u0437\u0438, \u043a\u043e\u043c\u043f\u043b\u0435\u043a\u0441\u043d\u0430 \u0441\u0438\u0441\u0442\u0435\u043c\u0430 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u043e\u0457 \u0431\u0435\u0437\u043f\u0435\u043a\u0438 \u043f\u0456\u0434\u043f\u0440\u0438\u0454\u043c\u0441\u0442\u0432\u0430, \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u0438 \u0437\u0430\u0441\u043e\u0431\u0456\u0432 \u0437\u0430\u0445\u0438\u0441\u0442\u0443 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0457.<\/p>\n<p style=\"text-align: center;\"><strong>\u00a0<\/strong><strong>\u0420\u043e\u0437\u0448\u0438\u0440\u0435\u043d\u0430 \u0430\u043d\u043e\u0442\u0430\u0446\u0456\u044f \u0430\u043d\u0433\u043b\u0456\u0439\u0441\u044c\u043a\u043e\u044e \u043c\u043e\u0432\u043e\u044e<\/strong><\/p>\n<p>The article considers the basic concepts of information security; the sources of threats to the information resources of the enterprise, in particular anthropogenic, technogenic and natural; features of complex information security system are covered; an analytical review of the world&#8217;s most common platforms for the protection of corporate information.<br \/>\nThis allowed to identify the advantages and disadvantages of modern means of protection information resources and to develop a number of recommendations for improving the organization of protection business information.<br \/>\nIt was found that information protection measures at the enterprise are mainly related to counteracting unauthorized receipt of information by technical means.<br \/>\nIt is established that at present in business structures the information is protected in various ways. These include protection of programs from reading and copying, protection of copyright on information, protection against unauthorized access and launch of programs, self-testing and self-recovery of running program code and other means capable of ensuring the integrity, accessibility and confidentiality of information. However, the advantage is a comprehensive information security system that comprehensively covers vulnerabilities and provides protection both externally and internally. This provides a flexible combination of the necessary software and hardware and organizational measures. The construction of such a system involves not only its assembly from specialized tools from different manufacturers, as a designer, but also the implementation of a single concept of information security. It is a comprehensive conceptual analysis of the information system then allows you to develop an optimal policy to ensure this security.<br \/>\nIn general, it can be noted that the development and implementation of methods and means of protection information resources is certainly one of the important issues for business structures, as they are a modern and effective means of ensuring the integrity, accessibility and confidentiality of information flows.<br \/>\n<strong>Keywords:<\/strong> information security, security entity, business structure, threat source, complex information security system of the enterprise, information security platforms.<\/p>\n<p style=\"text-align: center;\"><strong>\u00a0References<\/strong><\/p>\n<ol>\n<li>Grusho A.A. Teoreticheskie osnovy zashity informacii \/ Grusho A.A., Timonina E.E. \u2013 M. : Izdatelstvo agentstva \u00abYahtsmen\u00bb, 2001. \u2013 76 s.<\/li>\n<li>Pro kontseptsiiu natsionalnoi prohramy informatyzatsii : zakon Ukrainy \/\/ Vidomosti Verkhovnoi Rady Ukrainy. \u2013 1998. \u2013 \u2116 27-28.<\/li>\n<li>Zubok M.I. Informatsiina bezpeka v pidpryiemnytskii diialnosti : navch. posibnyk \/ Zubok M.I. \u2013 K. : KNTEU, 2006. \u2013 115 s.<\/li>\n<li>Luzhetskyi V.A. Osnovy informatsiinoi bezpeky : navch. posibnyk \/ Luzhetskyi V.A., Kozhukhivskyi A.D., Voitovych O.P. \u2013 Vinnytsia : VNTU, 2006. \u2013 115 s.<\/li>\n<li>Lipkan V.A. Informatsiina bezpeka Ukrainy v umovakh yevrointehratsii : navchalnyi posibnyk \/ Lipkan V.A. Maksymenko Yu.Ie., Zhelikhovskyi V.M. \u2013 K. : KNT, 2006. \u2013 280 s.<\/li>\n<li>Sherbakov A.Yu. Vvedenie v teoriyu i praktiku kompyuternoj bezopasnosti \/ Sherbakov A.Yu. \u2013 M. : Nolidzh, 2001. \u2013 150 s.<\/li>\n<li>Sosnin A.S. Menedzhment bezpeky pidpryiemnytstva \/ Sosnin A.S., Pryhunov P.Ia. \u2013 K. : Yevropeiskyi un-t, 2002. \u2013 128 s.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[10],"tags":[],"_links":{"self":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/3509"}],"collection":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3509"}],"version-history":[{"count":3,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/3509\/revisions"}],"predecessor-version":[{"id":6425,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/3509\/revisions\/6425"}],"wp:attachment":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3509"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3509"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3509"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}