z-logo
open-access-imgOpen Access
INSIDER THREAT MANAGEMENT AS AN ELEMENT OF THE CORPORATE ECONOMIC SECURITY
Author(s) -
Dmytro Zatonatskiy,
В. Г. Маргасова,
Nataliia Korogod
Publication year - 2021
Publication title -
fìnansovo-kreditna dìâlʹnìstʹ: problemi teorìì̈ ta praktiki
Language(s) - English
Resource type - Journals
eISSN - 2310-8770
pISSN - 2306-4994
DOI - 10.18371/fcaptp.v1i36.227690
Subject(s) - insider , insider threat , business , confidentiality , order (exchange) , insider trading , computer security , finance , computer science , law , political science
. This paper considers the insider threats in the companies from different sectors and various methods of their assessment. The problem of information leakage is becoming increasingly important for companies in all areas of economic activity. The problem of insider threats is becoming increasingly important, as the company may incur losses not only due to the leakage of information about its inventions, but also through lawsuits in case of theft of personal information of the customers, contractors and more. This means that in order to gain access to the international markets, Ukrainian companies must have an appropriate level of protection not only of the company’s confidential information, but also of the data on customers, contractors, etc. The objective of the article is to analyze the existing methodological approaches to the assessment of insider threats in the enterprise as a component of personnel and economic security. We came to the conclusion that different industries have different vulnerabilities to insider threats and different approaches to insider threat management. It was determined that information leaks are a serious threat to the company’s economic and personnel security. It was discovered that firms have achieved significant improvements and developed effective procedures for counteracting external threats, however, protection against insider attacks remains rather low. In the course of the research, the concept of an insider attacker was defined, the types of insider threats were established, and the main actions of the personnel prior to the insider attack were outlined. It was proved that the degree of insider threat is determined by the type of activity of the company and the liquidity of information that may be leaked. Most leaks are observed in high-tech companies and medical institutions, while the most liquid is the information of banks, financial institutions, industrial and commercial companies.Keywords: corporate economic security, human capital, personnel security, insider threat management, information databaseFormulas: 0; fig.: 5; tabl.: 0; bibl.: 20.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here