Theoreticsl and methodological approaches to information security policy of the state border service of Ukraine
Manokin E.
Additional contact information
Manokin E.: Institute of State Border Guard Service of Ukraine
Management, 2015, vol. 9, issue 1, 156-164
Abstract:
The trend towards globalization of the information sphere leads to the fact that information and communication infrastructure of the country and national information resources are the objects vulnerable to impact from geopolitical rivals, terrorist organizations, criminal groups and malefactors. Taking into consideration these factors, the information development of Ukraine that is lags behind the leading countries of the world, should be carried out within the limits of the system and balanced state of the information policy aimed at the active counteraction to information aggression. In this connection it is necessary to develop theoretical and methodological approaches to formation of departmental policy of the information security of the State Border Service of Ukraine, as part of an overall system of national security. As the information security policy of any organization should be based on the principles as follows: systematics; complexity; continuity of protection; competence of mechanisms and measures of protection and their adequacy to the threats; flexible control system of protection, simplicity and ease of use; openness of the algorithms and mechanisms of protection, unless otherwise provided separately, Then the departmental security policy of the State Border Guard Service of Ukraine should conclusively provide assurance that: in the organization or in an automated system (in each part, each functional specification and so on) it is provided the adequacy of the level of information security to the level of its criticality; implementation of measures of information security is profitable; it is provided the personification of the security policy provisions, the reporting (registration, audit) for all the critical (in terms of security) resources that are accessed during the operation of automated systems; staff and users are provided with a complete set of documentation concerning the order of information security; all the critical (in terms of security of information) technologies have appropriate plans to ensure the continuous operation and its recovery in case of emergencies;the requirements of all the documents that regulate the procedure of information security in the organization, facilities of the information activities and automated systems are taken into account. Based on the foregoing, we believe that a systematic and comprehensive manner to ensure the information security policy of the State Border Guard Service of Ukraine is the synthesis and implementation of the public administration methods in the field of protection of information resources.
Keywords: information security policy; resources; administration (management); methods; decentralization; effectiveness (search for similar items in EconPapers)
Date: 2015
References: View complete reference list from CitEc
Citations:
Downloads: (external link)
http://visnyk.amu.edu.ua/repec/archive/1_2015/156-164.pdf (application/pdf)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:ama:journl:v:9:y:2015:i:1:p:156-164
Access Statistics for this article
Management is currently edited by Oleksandr Datsii
More articles in Management from Academy of Municipal Administration Contact information at EDIRC.
Bibliographic data for series maintained by Ivan Dragan ().