profit for the organization. Information security
threats have a different nature of origin, they can be
internal, external, passive, active, intentional and
unintentional, natural and artificial.
The main task of information security at an
enterprise is to ensure the information environment,
first of all, confidentiality, integrity and availability
(Litvintseva and Karelin, 2020). To ensure
information security, organizations develop and use
an information security model, which should include
a set of relevant internal and external factors and their
impact on the state of information security at the
facility and the safety of information resources.
The information security model shows that the
owner of information, in an effort to save the resource
and reduce the risk of information security, applies
countermeasures, vulnerabilities, which depend on
the impact of threats. Information security threats are
created by violators, and as a result, risks arise that
incur losses for the resource. To ensure an effective
information security system, methods and tools used
for protection are being developed.
Information security methods and tools can be
divided into two areas, such as hardware and software
security (formal) and information security through
communication channels (informal).
Instruments of informal methods of information
protection are normative (legislative), administrative,
organizational acts and moral and ethical standards,
which include: documents, rules, activities enshrined
in the organization (Malyuk, 2016).
In the meantime, there is no need to worry about
it. In order to effectively and expediently use
information security methods and tools, an
organization must have the ability to make optimal
organizational and management decisions in the field
of information security. Also be able to apply the
basic laws of creation and principles of functioning of
systems of economic security and information
security, be able to collect, analyze, systematize,
evaluate and interpret the data necessary to solve
professional problems related to information security.
One of the important manifestations of the
influence of information security tools and methods
on the economic security of an organization is the
financial component. Any information security
planning requires an expense from the organization.
Organizational costs can be divided into capital
and operating costs.
Capital expenditures include: costs of network
and telecommunications equipment, system and
hardware, software, buildings and premises required
to ensure information security.
Operating costs are current costs and include:
personnel costs, telecommunications costs and other
expenses.
Analysis of information security risks in an
enterprise is a complex process, since it is not always
possible to give an accurate cost estimate of an
information asset of an enterprise and to determine
the degree of vulnerability of an asset. The essence of
risk management at an enterprise is to assess the size
of risks, formulate effective and cost-effective
measures to reduce risks, check whether the values of
risks are within an acceptable framework
(Chichkanov et al., 2020).
The first stage is the collection and processing of
information related to risks. This stage can be called
preparation for an information security risk
assessment, which includes:
- definition of the area in which the risk is
investigated;
- identification of valuable information assets;
- further assets are grouped by category;
- identification of all possible threats to
information security that can damage the information
of the enterprise and affect its economic security;
- the probability of the onset of information
security threats is determined;
- determination of the level of damage.
Next, a risk assessment is carried out, which
includes risk analysis and risk assessment.
At the initial stage, the risk is assigned a
qualitative probability score from 1 to 5 and a score
is given using the matrix. Let's consider the main risks
of information security in the company and give them
an assessment, including the likelihood and scale of
costs using the matrix.
Risks ranging from 1 to 5 are low. With an
indicator of 6-10, they have an average degree of
damage. If the indicator is from 11 to 15, then the risk
is already considered high, and if the indicator is more
than 15, then the risk belongs to extremely high risks.
The risk of confidential information leakage is
frequent, since all employees of the enterprise have
confidential information to one degree or another and
can pose a threat to information security, but at
different scales of valuation, the classification of risk
according to the degree of consequences will be
different. So, in the event of a leak of information
related to the salary of a full-time employee, the risk
will be considered low, and in the event of a leak of
information related to a business strategy or a trade
secret, the risk will already be high.
Using this matrix, it is possible to correlate the
impact of information security risks on economic
security, since, depending on the value of the asset,
Information Security in the System of Economic Security of Companies
153