15
Martynenko Bohdan Mykolayovych Kysylenko Ivan Pavlovich Institute of Special Communications and Information Security

Martynenko Bohdan Mykolayovych Kysylenko Ivan Pavlovich Institute of Special Communications and Information Security

Embed Size (px)

Citation preview

Page 1: Martynenko Bohdan Mykolayovych Kysylenko Ivan Pavlovich Institute of Special Communications and Information Security

Martynenko Bohdan MykolayovychKysylenko Ivan Pavlovich

Institute of Special Communications and Information Security

Page 2: Martynenko Bohdan Mykolayovych Kysylenko Ivan Pavlovich Institute of Special Communications and Information Security
Page 3: Martynenko Bohdan Mykolayovych Kysylenko Ivan Pavlovich Institute of Special Communications and Information Security
Page 4: Martynenko Bohdan Mykolayovych Kysylenko Ivan Pavlovich Institute of Special Communications and Information Security

Information security is the main problem of many companies all over the world.

“Physical and environmental security, using standard T-REC-X.1051-200802. Information security management guidelines for telecommunications organizations based on ISO 27002”. This standard is in project as Ukrainian standard.

Page 5: Martynenko Bohdan Mykolayovych Kysylenko Ivan Pavlovich Institute of Special Communications and Information Security
Page 6: Martynenko Bohdan Mykolayovych Kysylenko Ivan Pavlovich Institute of Special Communications and Information Security

The objective of second point is to prevent loss, damage, theft or compromise of assets and interruption to the organization's activities.

Page 7: Martynenko Bohdan Mykolayovych Kysylenko Ivan Pavlovich Institute of Special Communications and Information Security
Page 8: Martynenko Bohdan Mykolayovych Kysylenko Ivan Pavlovich Institute of Special Communications and Information Security
Page 9: Martynenko Bohdan Mykolayovych Kysylenko Ivan Pavlovich Institute of Special Communications and Information Security
Page 10: Martynenko Bohdan Mykolayovych Kysylenko Ivan Pavlovich Institute of Special Communications and Information Security
Page 11: Martynenko Bohdan Mykolayovych Kysylenko Ivan Pavlovich Institute of Special Communications and Information Security
Page 12: Martynenko Bohdan Mykolayovych Kysylenko Ivan Pavlovich Institute of Special Communications and Information Security
Page 13: Martynenko Bohdan Mykolayovych Kysylenko Ivan Pavlovich Institute of Special Communications and Information Security
Page 14: Martynenko Bohdan Mykolayovych Kysylenko Ivan Pavlovich Institute of Special Communications and Information Security
Page 15: Martynenko Bohdan Mykolayovych Kysylenko Ivan Pavlovich Institute of Special Communications and Information Security

As a result a number of above mentioned steps has to be followed in order to accomplish information security.

It should be noted that safety provision is highly dependent not only on monetary resources, but can also be stimulated through strict supervision of the data utilized on a certain territory. This should be taken into consideration.