{"id":3589,"date":"2021-01-30T23:26:30","date_gmt":"2021-01-30T21:26:30","guid":{"rendered":"http:\/\/journals.khnu.km.ua\/vestnik\/?p=3589"},"modified":"2021-05-14T11:16:48","modified_gmt":"2021-05-14T08:16:48","slug":"%d0%bd%d0%be%d0%b2%d1%96-%d0%b2%d0%b8%d0%ba%d0%bb%d0%b8%d0%ba%d0%b8-%d1%82%d0%b0-%d0%be%d1%81%d0%be%d0%b1%d0%bb%d0%b8%d0%b2%d0%be%d1%81%d1%82%d1%96-%d1%81%d1%82%d0%b2%d0%be%d1%80%d0%b5%d0%bd%d0%bd","status":"publish","type":"post","link":"https:\/\/journals.khnu.km.ua\/vestnik\/?p=3589","title":{"rendered":"\u041d\u043e\u0432\u0456 \u0432\u0438\u043a\u043b\u0438\u043a\u0438 \u0442\u0430 \u043e\u0441\u043e\u0431\u043b\u0438\u0432\u043e\u0441\u0442\u0456 \u0441\u0442\u0432\u043e\u0440\u0435\u043d\u043d\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0438 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u043e\u0457 \u0431\u0435\u0437\u043f\u0435\u043a\u0438 \u043f\u0456\u0434\u043f\u0440\u0438\u0454\u043c\u0441\u0442\u0432\u0430"},"content":{"rendered":"<p><!--more--><\/p>\n<p style=\"text-align: center;\">\u041d\u041e\u0412\u0406 \u0412\u0418\u041a\u041b\u0418\u041a\u0418 \u0422\u0410 \u041e\u0421\u041e\u0411\u041b\u0418\u0412\u041e\u0421\u0422\u0406 \u0421\u0422\u0412\u041e\u0420\u0415\u041d\u041d\u042f \u0421\u0418\u0421\u0422\u0415\u041c\u0418 \u0406\u041d\u0424\u041e\u0420\u041c\u0410\u0426\u0406\u0419\u041d\u041e\u0407 \u0411\u0415\u0417\u041f\u0415\u041a\u0418 \u041f\u0406\u0414\u041f\u0420\u0418\u0404\u041c\u0421\u0422\u0412\u0410<\/p>\n<p style=\"text-align: center;\">NEW CHALLENGES AND FEATURES OF SYSTEM CREATION OF INFORMATION SECURITY OF THE ENTERPRISE<\/p>\n<p><strong><a href=\"http:\/\/journals.khnu.km.ua\/vestnik\/wp-content\/uploads\/2021\/01\/6-20.pdf\"><img src=\"http:\/\/journals.khnu.km.ua\/vestnik\/wp-content\/uploads\/2021\/01\/pdf.png\" \/><\/a> \u0421\u0442\u043e\u0440\u0456\u043d\u043a\u0438: 19-22. \u041d\u043e\u043c\u0435\u0440: \u21165, 2020 (286)<\/strong><\/p>\n<p><strong>\u0410\u0432\u0442\u043e\u0440\u0438:<\/strong><br \/>\n\u0411\u0410\u041a\u0410\u0419 \u0412. \u0419., \u0417\u0418\u041c\u0410 \u0412. \u041c.<br \/>\n\u0425\u043c\u0435\u043b\u044c\u043d\u0438\u0446\u044c\u043a\u0438\u0439 \u043d\u0430\u0446\u0456\u043e\u043d\u0430\u043b\u044c\u043d\u0438\u0439 \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442<\/p>\n<p>BAKAY V., ZUMA V.<br \/>\nKhmelnytskyi National University<\/p>\n<p><strong>DOI<\/strong><strong>:<\/strong>\u00a0<a href=\"https:\/\/www.doi.org\/10.31891\/2307-5740-2020-286-5-4\">https:\/\/www.doi.org\/10.31891\/2307-5740-2020-286-5-4<\/a><br \/>\n<strong>\u041d\u0430\u0434\u0456\u0439\u0448\u043b\u0430 \/ Paper received :<\/strong> 19.08.2020<br \/>\n<strong>\u041d\u0430\u0434\u0440\u0443\u043a\u043e\u0432\u0430\u043d\u0430 \/ Paper Printed :<\/strong> 02-05.11.2020<\/p>\n<p style=\"text-align: center;\"><strong>\u0410\u043d\u043e\u0442\u0430\u0446\u0456\u044f \u043c\u043e\u0432\u043e\u044e \u043e\u0440\u0438\u0433\u0456\u043d\u0430\u043b\u0443<\/strong><\/p>\n<p>\u0423 \u0441\u0442\u0430\u0442\u0442\u0456 \u0440\u043e\u0437\u0433\u043b\u044f\u043d\u0443\u0442\u043e \u043e\u0441\u043e\u0431\u043b\u0438\u0432\u043e\u0441\u0442\u0456 \u0441\u0442\u0432\u043e\u0440\u0435\u043d\u043d\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0438 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u043e\u0457 \u0431\u0435\u0437\u043f\u0435\u043a\u0438 \u043f\u0456\u0434\u043f\u0440\u0438\u0454\u043c\u0441\u0442\u0432\u0430, \u0449\u043e \u043f\u043e\u0432\u2019\u044f\u0437\u0430\u043d\u043e \u0437 \u0437\u0430\u0433\u0430\u043b\u044c\u043d\u043e\u044e \u043a\u043e\u043c\u043f\u2019\u044e\u0442\u0435\u0440\u0438\u0437\u0430\u0446\u0456\u0454\u044e, \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0442\u0438\u0437\u0430\u0446\u0456\u0454\u044e \u0442\u0430 \u0446\u0438\u0444\u0440\u043e\u0432\u0456\u0437\u0430\u0446\u0456\u0454\u044e \u0441\u0443\u0441\u043f\u0456\u043b\u044c\u0441\u0442\u0432\u0430. \u0417\u2019\u044f\u0441\u043e\u0432\u0430\u043d\u043e, \u0449\u043e \u0437\u043d\u0430\u0447\u0435\u043d\u043d\u044f \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u043e\u0457 \u0431\u0435\u0437\u043f\u0435\u043a\u0438 \u0434\u043b\u044f \u043f\u0456\u0434\u043f\u0440\u0438\u0454\u043c\u0441\u0442\u0432\u0430 \u0437\u0440\u043e\u0441\u0442\u0430\u0454, \u0437\u2019\u044f\u0432\u043b\u044f\u044e\u0442\u044c\u0441\u044f \u043d\u043e\u0432\u0456 \u0437\u0430\u0433\u0440\u043e\u0437\u0438 \u0442\u0430 \u0432\u0438\u043a\u043b\u0438\u043a\u0438 \u044f\u043a\u0456 \u043c\u0430\u044e\u0442\u044c \u0431\u0443\u0442\u0438 \u043e\u043f\u0435\u0440\u0430\u0442\u0438\u0432\u043d\u043e \u0432\u0438\u0440\u0456\u0448\u0435\u043d\u0456. \u041e\u043a\u0440\u0456\u043c \u0442\u043e\u0433\u043e \u0443 \u0437\u0432\u2019\u044f\u0437\u043a\u0443 \u0437 \u0433\u043b\u043e\u0431\u0430\u043b\u044c\u043d\u043e\u044e \u043f\u0430\u043d\u0434\u0435\u043c\u0456\u0454\u044e COVID-19 \u0442\u0430 \u043e\u0441\u043e\u0431\u043b\u0438\u0432\u043e\u0441\u0442\u044f\u043c\u0438 \u0432\u0456\u0434\u0434\u0430\u043b\u0435\u043d\u043e\u0457 \u0440\u043e\u0431\u043e\u0442\u0438 \u043f\u0435\u0440\u0435\u0434 \u043f\u0456\u0434\u043f\u0440\u0438\u0454\u043c\u0441\u0442\u0432\u0430\u043c\u0438 \u043f\u043e\u0441\u0442\u0430\u043b\u0438 \u043d\u043e\u0432\u0456 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0438\u00a0 \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0435\u043d\u043d\u044f \u0441\u0432\u043e\u0454\u0457 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u043e\u0457 \u0431\u0435\u0437\u043f\u0435\u043a\u0438. \u0412\u0456\u0434\u0437\u043d\u0430\u0447\u0435\u043d\u043e \u043d\u043e\u0432\u0456 \u0432\u0438\u043a\u043b\u0438\u043a\u0438 \u0449\u043e\u0434\u043e \u0437\u0440\u043e\u0441\u0442\u0430\u043d\u043d\u044f \u043a\u0456\u0431\u0435\u0440\u0437\u0430\u0433\u0440\u043e\u0437 \u0442\u0430 \u043d\u0435\u043e\u0431\u0445\u0456\u0434\u043d\u0456\u0441\u0442\u044c \u043f\u0440\u043e\u0442\u0438\u0434\u0456\u044f\u0442\u0438 \u0457\u043c, \u043e\u0441\u043e\u0431\u043b\u0438\u0432\u043e \u0443 \u0440\u043e\u0437\u0440\u0456\u0437\u0456 \u043e\u0441\u043e\u0431\u043b\u0438\u0432\u043e\u0441\u0442\u0435\u0439 \u043e\u0440\u0433\u0430\u043d\u0456\u0437\u0430\u0446\u0456\u0457 \u0440\u043e\u0431\u043e\u0447\u043e\u0433\u043e \u043f\u0440\u043e\u0446\u0435\u0441\u0443 \u0443 \u0447\u0430\u0441\u0438 \u043f\u0430\u043d\u0434\u0435\u043c\u0456\u0457. \u0414\u043b\u044f \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0435\u043d\u043d\u044f \u0440\u043e\u0437\u0432\u0438\u0442\u043a\u0443 \u043f\u0456\u0434\u043f\u0440\u0438\u0454\u043c\u0441\u0442\u0432\u0430 \u0437\u0430 \u0434\u043e\u043f\u043e\u043c\u043e\u0433\u043e\u044e \u0441\u0442\u0432\u043e\u0440\u0435\u043d\u043d\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0438 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u043e\u0457 \u0431\u0435\u0437\u043f\u0435\u043a\u0438 \u0437\u0430\u043f\u0440\u043e\u043f\u043e\u043d\u043e\u0432\u0430\u043d\u043e \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0456\u0457 \u043d\u0430 \u043e\u0441\u043d\u043e\u0432\u0456 \u0454\u0432\u0440\u043e\u043f\u0435\u0439\u0441\u044c\u043a\u043e\u0433\u043e \u0434\u043e\u0441\u0432\u0456\u0434\u0443 \u0437\u0430\u0445\u0438\u0441\u0442\u0443 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0457 \u043a\u043e\u043c\u043f\u0430\u043d\u0456\u0439.<br \/>\n<strong>\u041a\u043b\u044e\u0447\u043e\u0432\u0456 \u0441\u043b\u043e\u0432\u0430:<\/strong> \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u044f, \u0435\u043a\u043e\u043d\u043e\u043c\u0456\u043a\u0430, \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u0430 \u0431\u0435\u0437\u043f\u0435\u043a\u0430 \u043f\u0456\u0434\u043f\u0440\u0438\u0454\u043c\u0441\u0442\u0432\u0430, \u043a\u0456\u0431\u0435\u0440\u0437\u0430\u0433\u0440\u043e\u0437\u0438, \u0446\u0438\u0444\u0440\u043e\u0432\u0456 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0456\u0457, \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0442\u0438\u0437\u0430\u0446\u0456\u044f, \u0445\u0430\u043a\u0435\u0440\u0441\u044c\u043a\u0456 \u0430\u0442\u0430\u043a\u0438, \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u043f\u0456\u0434\u043f\u0440\u0438\u0454\u043c\u0441\u0442\u0432\u043e.<\/p>\n<p style=\"text-align: center;\"><strong>\u0420\u043e\u0437\u0448\u0438\u0440\u0435\u043d\u0430 \u0430\u043d\u043e\u0442\u0430\u0446\u0456\u044f \u0430\u043d\u0433\u043b\u0456\u0439\u0441\u044c\u043a\u043e\u044e \u043c\u043e\u0432\u043e\u044e<\/strong><\/p>\n<p>The article considers the peculiarities of creating an information security system of the enterprise, which is associated with the general computerization, informatization and digitalization of society. It was found that the importance of information security for the company is growing, there are new threats and challenges that must be addressed quickly. In addition, due to the global COVID-19 pandemic and the peculiarities of remote work, companies have new challenges in ensuring their information security.<br \/>\nThere are challenges to the growth of cyber threats and the need to counter them, especially in terms of the peculiarities of the organization of the work process during a pandemic. New challenges, as well as the peculiarities of the organization of work have drawn attention to information security, intensified rule-making activities in this area in the direction of strengthening control over information security, resolving disputes, strengthening countering cyber threats. In the new realities, when information technologies become global, information security is an integral part of the system of economic security of the enterprise and the economic security of the state as a whole.<br \/>\nTo ensure the development of the enterprise through the creation of an information security system, recommendations based on the European experience of information protection of companies are proposed. Important steps are the actual support and control of the information security system of the enterprise. After all, in recent years there has been a rapid increase in threats related to information cybersecurity.<br \/>\nIn addition, it is noted that reliable information security is a prerequisite for the transition to a model of sustainable development of an individual enterprise. To maintain a business, develop it and be competitive, it is necessary to create an effective information security system. The essence of the above gives grounds to assert that in the new realities, without proper protection of the information environment of the enterprise it is impossible to ensure its economic security.<br \/>\n<strong>Keywords:<\/strong> information, economy, information security of the enterprise, cyber threats, digital technologies, informatization, hacker attacks, system, enterprise.<\/p>\n<p style=\"text-align: center;\"><strong>References<\/strong><\/p>\n<ol>\n<li>Pro informatsiiu [Elektronnyi resurs] : Zakon Ukrainy vid 02.10.1992 \u2116 2658-XII \/\/ Vidomosti Verkhovnoi Rady Ukrainy. \u2013 1992. \u2013 \u2116 48. \u2013 st. 651. \u2013 Rezhym dostupu : https:\/\/zakon.rada.gov.ua\/laws\/show\/2657-12#Text.<\/li>\n<li>Sorokivska O.A. Informatsiina bezpeka pidpryiemstva: novi zahrozy ta perspektyvy \/ O.A. Sorokivska, V.L. Hevko \/\/ Herald of Khmelnytskyi National University. \u2013 2010. \u2013 \u2116 2. \u2013 T. 2. \u2013 S. 32\u201335.<\/li>\n<li>Hoffman L.Dzh. Sovremennye metody zashity informacii \/ L. Dzh. Hoffman ; per. s angl. \u2013 M. : Sov. radio, 1980. \u2013 57 s.<\/li>\n<li>Novi vyklyky dlia informatsiinoi bezpeky pidpryiemstva: yak minimizuvaty potentsiini ryzyky [Elektronnyi resurs]. \u2013 Rezhym dostupu : https:\/\/eset.ua\/ua\/blog\/view\/67\/novyye-vyzovy-dlya-informatsionnoy-bezopasnosti-predpriyatiya-kak-minimizirovat-potentsialnyye-riski.<\/li>\n<li>Barometr riskov. Allianz nazval globalnye riski kompanij v 2018 godu \/\/ Forinshurer strahovanie [Elektronnyi resurs]. \u2013 Rezhym dostupu : https:\/\/forinsurer.com\/news\/18\/01\/26\/35755?hl=%C1%E0%F0%EE%EC%E5%F2%F0.<\/li>\n<li>V Ukraini v 2020 rotsi zafiksuvaly 1 milion kiberatak \u2013 RNBO \/\/ MediaSapiens [Elektronnyi resurs]. \u2013 Rezhym dostupu : https:\/\/ms.detector.media\/kiberbezpeka\/post\/25227\/2020-08-07-v-ukraini-v-2020-rotsi-zafiksuvali-1-milion-kiberatak-rnbo\/.<\/li>\n<li>Boiko V.D. Kiberbezpeka v krainakh YeS ta krainakh chlenakh: henezys ta problemy yii pidvyshchennia \/ V.D. Boiko, M.D. Vasylenko, S.V. Vasylenko [Elektronnyi resurs]. \u2013 Rezhym dostupu : http:\/\/www.academy.ssu.gov.ua\/ua\/page\/page_1581426437.htm.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[10],"tags":[],"_links":{"self":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/3589"}],"collection":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3589"}],"version-history":[{"count":3,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/3589\/revisions"}],"predecessor-version":[{"id":6262,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/3589\/revisions\/6262"}],"wp:attachment":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3589"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3589"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3589"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}