APPROACHES TO IDENTIFY VULNERABILITIES IN THE SECURITY SYSTEM OF THE SOCIAL ORGANIZATION AND COMPUTER RESOURCES
APPROACHES TO IDENTIFY VULNERABILITIES IN THE SECURITY SYSTEM OF THE SOCIAL ORGANIZATION AND COMPUTER RESOURCES
DOI:
https://doi.org/10.46687/jsar.v5i1.115Keywords:
Company Security system, computer security, encroachment, indefensibility, management, mechanisms, security environment, protection, threats, vulnerabilitiesAbstract
Essential component of organizing stage of the counteraction for the en-croachment against the business organization is to identify vulnerabilities of the social organization. The purpose of this stage is to identify all existing and potential weaknesses and disadvantages of the security system of the organization, creating a circumstance for adversely effects on the sources of threat.
References
Decker, R., Homeland Security: A Risk management Approach, Statement before Senate Committee on Governmental Affairs, Washington, D.C., 2001.р.10.
Sandev, G. Security of organizations, Konstantin Preslavsky University Press, Shumen, 2012, ISBN 978-954-577-621-2.
Stanev, St, Zhelezov St, Computer and Network Security, Konstantin Preslavsky University Press, Shumen, 2002.
Mlechenkov, M., „Methodology for developing a system for information security”, Vasil Levski” National Military University, Artillery, AAD and CIS faculty, Shumen, 2010. s.5.
Dimanova D., Iliev Sv., Steganography - the art of hiding information,. Konstantin Preslavsky University Press, Shumen, 2013.
RiskManagementStandards, 2002.р.14.
Vladimirov, P., Management of the special services, S., 2002, SB. p.164-190.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 JOURNAL SCIENTIFIC AND APPLIED RESEARCH
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.