IDEAS home Printed from https://ideas.repec.org/a/ama/journl/v9y2015i1p156-164.html
   My bibliography  Save this article

Theoreticsl and methodological approaches to information security policy of the state border service of Ukraine

Author

Listed:
  • Manokin E.

    (Institute of State Border Guard Service of Ukraine)

Abstract

The trend towards globalization of the information sphere leads to the fact that information and communication infrastructure of the country and national information resources are the objects vulnerable to impact from geopolitical rivals, terrorist organizations, criminal groups and malefactors. Taking into consideration these factors, the information development of Ukraine that is lags behind the leading countries of the world, should be carried out within the limits of the system and balanced state of the information policy aimed at the active counteraction to information aggression. In this connection it is necessary to develop theoretical and methodological approaches to formation of departmental policy of the information security of the State Border Service of Ukraine, as part of an overall system of national security. As the information security policy of any organization should be based on the principles as follows: systematics; complexity; continuity of protection; competence of mechanisms and measures of protection and their adequacy to the threats; flexible control system of protection, simplicity and ease of use; openness of the algorithms and mechanisms of protection, unless otherwise provided separately, Then the departmental security policy of the State Border Guard Service of Ukraine should conclusively provide assurance that: in the organization or in an automated system (in each part, each functional specification and so on) it is provided the adequacy of the level of information security to the level of its criticality; implementation of measures of information security is profitable; it is provided the personification of the security policy provisions, the reporting (registration, audit) for all the critical (in terms of security) resources that are accessed during the operation of automated systems; staff and users are provided with a complete set of documentation concerning the order of information security; all the critical (in terms of security of information) technologies have appropriate plans to ensure the continuous operation and its recovery in case of emergencies;the requirements of all the documents that regulate the procedure of information security in the organization, facilities of the information activities and automated systems are taken into account. Based on the foregoing, we believe that a systematic and comprehensive manner to ensure the information security policy of the State Border Guard Service of Ukraine is the synthesis and implementation of the public administration methods in the field of protection of information resources.

Suggested Citation

  • Manokin E., 2015. "Theoreticsl and methodological approaches to information security policy of the state border service of Ukraine," Management, Academy of Municipal Administration, vol. 9(1), pages 156-164, December.
  • Handle: RePEc:ama:journl:v:9:y:2015:i:1:p:156-164
    as

    Download full text from publisher

    File URL: http://visnyk.amu.edu.ua/repec/archive/1_2015/156-164.pdf
    Download Restriction: no
    ---><---

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:ama:journl:v:9:y:2015:i:1:p:156-164. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Ivan Dragan (email available below). General contact details of provider: https://edirc.repec.org/data/amakyua.html .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.