APPROACHES TO IDENTIFY VULNERABILITIES IN THE SECURITY SYSTEM OF THE SOCIAL ORGANIZATION AND COMPUTER RESOURCES

APPROACHES TO IDENTIFY VULNERABILITIES IN THE SECURITY SYSTEM OF THE SOCIAL ORGANIZATION AND COMPUTER RESOURCES

Authors

  • Hristo Hristov KONSTANTIN PRESLAVSKI UNIVERSITY OF SHUMEN, SHUMEN 9712, 115, UNIVERSITETSKA STR.
  • Petar Boyanov Konstantin Preslavsky University of Shumen, Faculty of Technical Sciences
  • Tihomir Trifonov Konstantin Preslavsky University of Shumen, Faculty of Technical Sciences

DOI:

https://doi.org/10.46687/jsar.v5i1.115

Keywords:

Company Security system, computer security, encroachment, indefensibility, management, mechanisms, security environment, protection, threats, vulnerabilities

Abstract

Essential component of organizing stage of the counteraction for the en-croachment against the business organization is to identify vulnerabilities of the social organization. The purpose of this stage is to identify all existing and potential weaknesses and disadvantages of the security system of the organization, creating a circumstance for adversely effects on the sources of threat.

Author Biographies

Hristo Hristov, KONSTANTIN PRESLAVSKI UNIVERSITY OF SHUMEN, SHUMEN 9712, 115, UNIVERSITETSKA STR.

KONSTANTIN PRESLAVSKI UNIVERSITY OF SHUMEN, SHUMEN 9712, 115, UNIVERSITETSKA STR.

Petar Boyanov, Konstantin Preslavsky University of Shumen, Faculty of Technical Sciences

Konstantin Preslavsky University of Shumen, Faculty of Technical Sciences

Tihomir Trifonov, Konstantin Preslavsky University of Shumen, Faculty of Technical Sciences

Konstantin Preslavsky University of Shumen, Faculty of Technical Sciences

References

Decker, R., Homeland Security: A Risk management Approach, Statement before Senate Committee on Governmental Affairs, Washington, D.C., 2001.р.10.

Sandev, G. Security of organizations, Konstantin Preslavsky University Press, Shumen, 2012, ISBN 978-954-577-621-2.

Stanev, St, Zhelezov St, Computer and Network Security, Konstantin Preslavsky University Press, Shumen, 2002.

Mlechenkov, M., „Methodology for developing a system for information security”, Vasil Levski” National Military University, Artillery, AAD and CIS faculty, Shumen, 2010. s.5.

Dimanova D., Iliev Sv., Steganography - the art of hiding information,. Konstantin Preslavsky University Press, Shumen, 2013.

RiskManagementStandards, 2002.р.14.

Vladimirov, P., Management of the special services, S., 2002, SB. p.164-190.

Downloads

Published

08.03.2023

How to Cite

Hristov, H., Boyanov, P., & Trifonov, T. (2023). APPROACHES TO IDENTIFY VULNERABILITIES IN THE SECURITY SYSTEM OF THE SOCIAL ORGANIZATION AND COMPUTER RESOURCES: APPROACHES TO IDENTIFY VULNERABILITIES IN THE SECURITY SYSTEM OF THE SOCIAL ORGANIZATION AND COMPUTER RESOURCES. JOURNAL SCIENTIFIC AND APPLIED RESEARCH, 5(1), 101–107. https://doi.org/10.46687/jsar.v5i1.115

Most read articles by the same author(s)

<< < 1 2 3 4 5 6 7 8