DEVELOPMENT AND PREPARATION OF INFORMATION SECURITY METHODS

Authors

  • Ulfat Sadigov Azerbaijan Technical University (Baku, Azerbaijan)

DOI:

https://doi.org/10.52171/herald.347

Keywords:

information security, cybercrime, two-factor authentication, cryptographic protection, antivirus systems, security policy

Abstract

The article examines relevant aspects of the problem of protecting confidential information within organizational information systems. The main objective of the study is to develop a comprehensive set of information security measures aimed at managing user access, strengthening authentication mechanisms, and ensuring the integrity of information resources. To address the stated problem, user access rights were classified by security levels, and mechanisms for physical and logical access control, two-factor authentication, cryptographic protection tools, network security systems, and antivirus software were analyzed. The effectiveness of data protection methods based on the GOST 28147-89 cryptographic algorithm, as well as specialized security software, was evaluated. The results of the analysis demonstrate that the integrated implementation of technical and organizational security measures significantly reduces the risk of unauthorized access to information resources, ensures data confidentiality and integrity, and creates conditions for the effective enforcement of the organization’s information security policy.

References

1. Efimushkin V.A., Ositis A.P. Rol «skvoznyh» cifrovyh tekhnologii v razvitii telekommunikacij // Moskva: Elektrosvyaz. 2021. №1, – s.28-35, DOI: 10.34832/ELSV.2021.14.1.003.

2. Hertzog R., Roland Mas. The DEBIAN administrator’s handbook. 2015. – 522 p.

3. Lachihina A.B. Modeli protivodejstviya ugrozam narusheniya informacionnoj bezopasnosti pri ekspluatacii baz dannyh v zashchishchennyh korporativnyh informacionnyh sistemah / Lachihina Anastasiya Borisovna – Moskva, 2010.

4. Luckij S.Ya. Korporativnoe upravlenie tekhnicheskim perevooruzheniem firm: Uchebnoe posobie / S.Ya. Luckij - M.: Vysshaya shkola, 2003. - 319 s.

5. İbrahimova S.R., Hüseynzadə İ.M. Təhlükəsizlik sisteminin təkmilləşdirilməsi üçün modifi-kasiya edilmiş Vernam şifrləmə alqoritmi. Elmi Məcmuə Cild 27, №3, 2025,

DOI: 10.30546/EMNAA.2025.25.03.108

6. Sravnenie Antivirusov 2019, https://www.anti-malware.ru/tests_history

7. Luchshie antivirusy 2026 goda, https://top10antivirusov.com/

8. Abbasova P.Ə. Kiberfiziki sistemlerdə təhlükəsizliyin analizi və qiymətləndirilməsi. “Azərbaycan Mühəndislik Akademiyasının Xəbərləri, 2025, 17(3), 111–118 s.

https://doi.org/10.52171/herald.303

Published

2026-01-12

How to Cite

Sadigov, U. (2026). DEVELOPMENT AND PREPARATION OF INFORMATION SECURITY METHODS. Herald of Azerbaijan Engineering Academy, 17(4), 1–13. https://doi.org/10.52171/herald.347

Similar Articles

<< < 1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.