2021
DOI: 10.1088/1757-899x/1047/1/012117
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of information security issues in corporate computer networks

Abstract: This article discusses the main problems associated with information security in corporate networks and ensuring the reliable operation of information systems and the services they provide. Information security is understood as the security of information resources and information systems, as well as the supporting infrastructure from accidental or deliberate influences of a natural or artificial nature, fraught with harm to the owners or users of information resources. Currently, there are major changes in in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(6 citation statements)
references
References 0 publications
0
5
0
Order By: Relevance
“…The economy with stocks and bonds is analyzed here, for example, annual and quarterly reports of emitter companies. Based on this analyses, the conclusion on which stocks should act better, and which ones are worse is made [6].…”
Section: Resultsmentioning
confidence: 99%
“…The economy with stocks and bonds is analyzed here, for example, annual and quarterly reports of emitter companies. Based on this analyses, the conclusion on which stocks should act better, and which ones are worse is made [6].…”
Section: Resultsmentioning
confidence: 99%
“…At the next stage, a study of the use of machine learning to prevent incidents and occupational risks at the workplace has been carried out. Statistical methods and machine learning algorithms, such as logistic regression and random forest, are applied to analyze the data and build models for prediction of incidents and occupational risks [12].…”
Section: Equipment Damage 150mentioning
confidence: 99%
“…Access is a significant component of insider threats, as proven by observations from the real world, assertions from academics, and discoveries from the information technology sector. The bulk of research that have been conducted on the topic of insider threats have come to the conclusion that the primary reason that insiders steal data from their organisations is because they were given authorized access to the material that was subsequently taken [23][24][25][26]. Seventy-five percent of thefts committed with authority were carried out, as reported by CERT, by workers or other insiders [1].…”
Section: Related Workmentioning
confidence: 99%
“…The unintended insider risk also includes a significant component that involves the unauthorised use of data obtained from an outside source [25]. Access to the company's networks is relatively easy to come by, but not everyone has direct access to the company's information technology resources [26]. In the prior studies, it was difficult to track down findings associated to those different resources.…”
Section: Introductionmentioning
confidence: 99%