scholarly journals THE ORGANIZATIONAL PRINCIPLES OF INFORMATION PROTECTION MANAGEMENT SYSTEM REALIZATION

MEST Journal ◽  
2019 ◽  
Vol 7 (2) ◽  
pp. 73-78
Author(s):  
Valeryi Sereda ◽  
Zinaida Zhyvko ◽  
Olga Balynska ◽  
Taras Rudyi
2020 ◽  
Vol 23 (6) ◽  
pp. 99-114
Author(s):  
B. S. Dongak ◽  
A. S. Shatohin ◽  
R. V. Meshcheryakov

Purpose of research. The purpose of this study is to assess the possibility of applying the methodology for centralized management of systems and information risks using the example of informatization of public departments of Republic of Tyva in order to optimize the cost of purchasing technical, software and hardware-software means of protecting information, as well as the payroll of maintenance technical personnel.Methods. One of the main research methods is the creation of an experimental model of the mechanism of a single information and computing network, combining various government departments located within the same administrative building, which allows working simultaneously with distributed or centralized applications, databases and other services, as well as centralized information risk management security. The next research method is the analysis and study of the principle of operation of information resources, information systems, databases, and the increase in the number of domain users if they are combined into a single data transfer network. The interaction and effectiveness of personnel, a specialized unit based on one government agency, ensuring the regular functioning of the network and the necessary level of information security for all government departments.Results. As a result, an economic effect is achieved by eliminating the acquisition of duplicate software and hardware information protection, increasing the efficiency of using unified information services, and creating a centralized structural unit that uses risk management tools and makes information security management decisions based on the principles of system analysis , structuring method and expert survey methods. The results of the study have been used in solving problems of improving the information security management system of the authorities of Republic of Tyva.Conclusion. We have developed the original information technology architecture of the information security management system and centralized use of information technologies for the government of Republic of Tyva. The distinctive features of the structure of software tools for the centralized approach are the multi-agent implementation of the control elements of the decision support system and the integration of various types of security management models into a single complex. 


Author(s):  
Mutalap ABSATTAROV

Most of the activities in state bodies are carried out by the organization of control over the execution of documents and instructions. The issues of ensuring control activities and document management in the conditions of remote work of employees are included on the agenda of state bodies and organizations. The article describes the current and possible practical approaches to the organization of control of documents and orders, which covers all stages and processes of reviewing documents: reception, control of registration, registration, distribution, sending to recipients, consideration, execution, approval, examination, approval, decision-making, signing, sending to the author of the document. For each of the stages and processes, their readiness for digitalization and transition to online work is described. The idea of creating, developing and implementing special information systems for remote document management, which can be installed and operated in parallel with the current document management system and in the mode of secure information protection, is considered.


2016 ◽  
Vol 8 (3) ◽  
pp. 70-73
Author(s):  
Зиновьев ◽  
P. Zinovev ◽  
Обухова ◽  
L. Obukhova ◽  
Рогозин ◽  
...  

The article describes the structure and composition of typical confidential information resource and the main directions of ensuring information security in electronic document management system.


2020 ◽  
Vol 3 (49) ◽  
pp. 69-78
Author(s):  
Volodymyr Melnyk ◽  

The article provides administrative and legal and theoretical and scientific characteristics of the civil service management system. The concepts, structure, constituent elements and features of the administrative and legal status of the subjects of this system are defined.


2021 ◽  
Author(s):  
Jaime Delgado ◽  
Silvia Llorente

To handle genomic information while supporting FAIR principles, we present GIPAMS, a modular architecture. GIPAMS provides security and privacy to manage genomic information by means of several independent services and modules that interact among them in an orchestrated way. The paper analyzes how some security and privacy aspects of the FAIRification process are covered by the GIPAMS platform.


Sign in / Sign up

Export Citation Format

Share Document