Enterprise Information Security Strategy: Monitoring and Management
T. A. Rudakova () and
O. Yu. Rudakova ()
Strategic decisions and risk management, 2026, vol. 17, issue 1
Abstract:
The security of an economic entity’s information and the infrastructure that supports it remains one of the key challenges at the current stage of economic relations. Unauthorized access to information, accidental or malicious impacts on information, and third-party intrusion into the operation of the supporting infrastructure threaten to reduce economic benefits and cause damage to economic entities, both legal entities and individuals. Under these conditions, one of the tasks of an organization’s economic security service is to prevent threats and mitigate risks related to unauthorized access to sensitive and financial information about the enterprise and to employees’ personal data. The objective of the study is to develop methodological recommendations for organizing the process of managing enterprise information security risks. In the course of the study, the authors obtained the following scientific results: the elements of information security (information protection, access restriction, encryption, security system, two-factor authentication, information transfer, document forgery, verification of the vulnerability of the information source, and information authenticity) were examined comparatively, considering both their current state and their historical development; information on participants involved in information theft and methods of unauthorized access was systematized; factors limiting compliance with personal data protection principles were analyzed; and information security risks were systematized in the context of object-vulnerability-threat. The practical significance of the research results lies in the possibility of integrating them into an organization’s management system and developing an internal control system to minimize threats and mitigate the risks of unauthorized access to sensitive and financial information and employees’ personal data.
Date: 2026
References: Add references at CitEc
Citations:
Downloads: (external link)
https://www.jsdrm.ru/jour/article/viewFile/1278/1208 (application/pdf)
https://www.jsdrm.ru/jour/article/viewFile/1278/1209 (application/pdf)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:abw:journl:y:2026:id:1278
DOI: 10.17747/2618-947X-2026-1-73-83
Access Statistics for this article
More articles in Strategic decisions and risk management from Real Economy Publishing House
Bibliographic data for series maintained by ООО Ð˜Ð·Ð´Ð°Ñ‚ÐµÐ»ÑŒÑ ÐºÐ¸Ð¹ дом Â«Ð ÐµÐ°Ð»ÑŒÐ½Ð°Ñ Ñ ÐºÐ¾Ð½Ð¾Ð¼Ð¸ÐºÐ°Â» ().