scholarly journals SECURITY OF CORPORATE INFORMATION IN FINTECH ECOSYSTEM

2021 ◽  
Vol 119 (6) ◽  
pp. 98-108
Author(s):  
CHUBAIEVSKYI Vitalii ◽  
VOLOSOVYCH Svitlana

Background. With the intensification of digitalization processes, the use of FinTech tools by various business entities, which include both financial service offerors and their consumers, is becoming especially important. Analysis of recent researches and publications. The works of many scientists are devoted to the functioning of various aspects of corporate information systems. However, there is currently a lack of research on the feasibility of using financial technology instruments by business entities, their threats and security for corporate information systems. The aim of the article is to study the place of FinTech tools in the corporate information system, identify threats to their use and ensure the security of their operation. Materials and methods. The theoretical and methodological basis of the study are the works of domestic and foreign scientists on the functioning of corporate information systems and FinTech ecosystems. Results. The basis of digital transformation is the use of innovative technologies in the financial services market. This leads to the appropriate transformation of information systems of business entities and ensuring their security. There is an intensification of business use of digital banking services, digital insurance, payment platforms, raising funds through crowdfunding platforms, investing. The FinTech ecosystem within the sectoral approach should be understood as the areas of application of financial technology instruments, the services of which are used by various consumers, in particular, business entities, individuals, public authorities.The increasing digitalization of financial activities of business entities as a result of the Covid-19 pandemic has intensified the creation of additional challenges for corporate information systems for the implementation of cyber risks. Conclusion. The use of financial technology tools by business entities leads to the formation of FinTech ecosystems. Ensuring the security of information systems is the key to corporate stability. The challenge of countering cyber threats is not only for financial service offerors, but also for business entities that are their consumers, as the use of financial technology tools in financial transactions causes risks to all participants in the FinTech ecosystem.

Author(s):  
Петр Юрьевич Филяк ◽  
Максим Константинович Постников ◽  
Семен Евгеньевич Федоров ◽  
Александр Григорьевич Остапенко ◽  
Андрей Петрович Преображенский

В условиях развития информационного общества (Knowledgeable society - KS) информационные системы стали неотъемлемой частью любой организации, даже самой малой, независимо от реализуемых ими бизнес-процессов. Такие информационные системы принято называть корпоративными информационными системами (КИС), или Corporate Information System (CIS). Особые требования при разработке КИС предъявляются к обеспечению их информационной безопасности, что может быть реализовано путем разработки КИС в защищенном исполнении. Технологии blockchain являются очень перспективными не только при применении их в традиционных сферах - производстве, сервисе, на транспорте, но и для решения проблем безопасности и информационной, в частности. Анализу данной проблемы и подходам к ее решению и посвящена данная статья. At present, in the context of the development of Knowledgeable society, information systems are at now an integral part of any organization, even the smallest, regardless of the business processes they implement. Such information systems are commonly referred to as Corporate Information Systems (CIS). Special requirements for the development of CIS are made to ensure their information security, which can be achieved by developing a protected version of the CIS. In this article is considered the analysis of this problem and approaches to its solution. Block Chain technologies are very promising not only when applying them in traditional spheres - manufacturing, service, transport, but also to solve security and information problems, in particular.


2021 ◽  
Vol 273 ◽  
pp. 07007
Author(s):  
Olesya Golubeva ◽  
Alina Pogorelova

Modern trends in the creation and development of corporate information systems (CIS) are largely determined by their consumer quality. A model of building a corporate information system (CIS) of a universal open architecture is presented. The possibility of using CIS for managing the production processes of a shoe organization is demonstrated.


2021 ◽  
Vol 46 (2) ◽  
Author(s):  
I. S. Galuzin ◽  
◽  
G. G. Naiman

The article analyzes the problem of cybersecurity of corporate information systems and defines the purpose and objectives of their protection. The analysis of technology of management of vulnerabilities of corporate information systems is carried out. Methods and tools for managing vulnerabilities of corporate information systems based on the Qualys solution are studied. The purpose, main functions and composition of Qualys solution software are defined. A variant of managing corporate information system vulnerabilities based on the Qualys solution has been developed.


2018 ◽  
pp. 6-11 ◽  
Author(s):  
Aleksey Babenko ◽  
Svetlana Kozunova

The level of information security of corporate information systems depends on the security of information assets of the enterprise in which the enterprise information systems are implemented. To protect data processed in corporate information systems, it is advisable to ensure the information security of the system, to identify and predict threats to information security violations. Such measures will ensure effective management of information security and high-quality response to threats in corporate information systems in real time. Thus, the research of threats management and information security of corporate information systems allows the authors to develop a model of threat profile. The difference from the previously proposed models is that the present solution defines the actions that need to be taken when threats are detected and to prevent them. Application of the proposed model will allow implementing special procedures of information security management of the enterprise, using private information security policies for corporate information systems. The authors highlight the key aspects of managing threats to information security of corporate information systems. The vulnerabilities typical for corporate information systems have been allocated. The sources of threats have been formed, and the potential violators have been described. A unique model of the profile of threats to information security for corporate information system has been developed.


Author(s):  
А. С. Баканов

В статье предложен способ разработки и визуализации модели межгруппового взаимодействия. Описанный способ основан на использовании когнитивных карт. В настоящее время, благодаря развитию информационных технологий, появилось большое количество корпоративных информационных систем, позволяющих сотрудникам организации осуществлять свою трудовую деятельность удаленно. Однако для повышения эффективности удаленного взаимодействия целесообразно уделять большее внимание способам визуализации и представления удаленного взаимодействия. Предложенная модель межгруппового взаимодействия ориентирована на анализ эффективности трудовой деятельности сотрудников, работающих удаленно с корпоративной информационной системой. The article proposes a method for developing and visualizing a model of intergroup interaction. The described method is based on the use of cognitive maps. Currently, thanks to the development of information technologies, a large number of corporate information systems have appeared that allow employees of the organization to carry out their work remotely. However, to increase the effectiveness of remote interaction, it is advisable to pay more attention to the methods of visualization and presentation of remote interaction. The presented model of intergroup interaction is focused on the analysis of labor efficiency of employees working remotely with a corporate information system.


2021 ◽  
Vol 46 (2) ◽  
Author(s):  
M. V. Volkov ◽  
◽  
O. D. Shapovalenko

A study of the impact of spam messages and modern threats to the process of e-mail exchange of corporate information system. The role of spam and its impact in corporate information systems is studied. The peculiarities of counteraction directions and technologies of providing protection of e-mail against spam are investigated. Based on the research conducted in the work, recommendations for improving the secure e-mail exchange of the corporate information system have been developed.


Sign in / Sign up

Export Citation Format

Share Document