DEVELOPMENT AND PREPARATION OF INFORMATION SECURITY METHODS
DOI:
https://doi.org/10.52171/herald.347Keywords:
information security, cybercrime, two-factor authentication, cryptographic protection, antivirus systems, security policyAbstract
The article examines relevant aspects of the problem of protecting confidential information within organizational information systems. The main objective of the study is to develop a comprehensive set of information security measures aimed at managing user access, strengthening authentication mechanisms, and ensuring the integrity of information resources. To address the stated problem, user access rights were classified by security levels, and mechanisms for physical and logical access control, two-factor authentication, cryptographic protection tools, network security systems, and antivirus software were analyzed. The effectiveness of data protection methods based on the GOST 28147-89 cryptographic algorithm, as well as specialized security software, was evaluated. The results of the analysis demonstrate that the integrated implementation of technical and organizational security measures significantly reduces the risk of unauthorized access to information resources, ensures data confidentiality and integrity, and creates conditions for the effective enforcement of the organization’s information security policy.
References
1. Efimushkin V.A., Ositis A.P. Rol «skvoznyh» cifrovyh tekhnologii v razvitii telekommunikacij // Moskva: Elektrosvyaz. 2021. №1, – s.28-35, DOI: 10.34832/ELSV.2021.14.1.003.
2. Hertzog R., Roland Mas. The DEBIAN administrator’s handbook. 2015. – 522 p.
3. Lachihina A.B. Modeli protivodejstviya ugrozam narusheniya informacionnoj bezopasnosti pri ekspluatacii baz dannyh v zashchishchennyh korporativnyh informacionnyh sistemah / Lachihina Anastasiya Borisovna – Moskva, 2010.
4. Luckij S.Ya. Korporativnoe upravlenie tekhnicheskim perevooruzheniem firm: Uchebnoe posobie / S.Ya. Luckij - M.: Vysshaya shkola, 2003. - 319 s.
5. İbrahimova S.R., Hüseynzadə İ.M. Təhlükəsizlik sisteminin təkmilləşdirilməsi üçün modifi-kasiya edilmiş Vernam şifrləmə alqoritmi. Elmi Məcmuə Cild 27, №3, 2025,
DOI: 10.30546/EMNAA.2025.25.03.108
6. Sravnenie Antivirusov 2019, https://www.anti-malware.ru/tests_history
7. Luchshie antivirusy 2026 goda, https://top10antivirusov.com/
8. Abbasova P.Ə. Kiberfiziki sistemlerdə təhlükəsizliyin analizi və qiymətləndirilməsi. “Azərbaycan Mühəndislik Akademiyasının Xəbərləri, 2025, 17(3), 111–118 s.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Ulfat Sadigov

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

