access control

Itil as a Component for Methodology Collecting, Processing, Storing, and Classifying Data in Accordance With SOC2 Type2 Requirements

In a world where the amount of electronic data is growing at a rapid pace every day, businesses face a new challenge: how to maintain control over information, make it secure, yet at the same time accessible and useful. The authors of the article see the answer to this question in the implementation of an ITSM component that ensures compliance with the international SOC 2 Type 2 standard. This standard is a kind of ‘trust mark’ for companies, as it confirms their ability to guarantee data security, confidentiality, and integrity.

COMPREHENSIVE APPROACH TO PROTECTING DATA AND THE INFORMATION SYSTEM INTEGRITY

The article discusses key information security principles, focusing on confidentiality, integrity, availability, traceability, and the DIE model (Distributed, Immutable, Ephemeral). Confidentiality emphasizes the importance of secrecy and controlling access to prevent sensitive information from misappropriation. Integrity ensures that data remains accurate and trustworthy, with measures to prevent unauthorized modifications.

Використання технологій експертних систем для створення інтелектуальної системи управління правами доступу до інформаційних ресурсів

In this paper integration of RBAC (Role-based access control) mechanism with an expert system technology for building modern intellectual access control systems is presented. As a result, intellectual access control system is created which if compared to existing systems proposes additionally some automation based on rules in knowledge base and self-teaching.

Проектування системи підтримки прийняття рішень виборця у вигляді веб-сайта

This general description of the decision support system for the voter as a We site We describe the principles of the DSS to the voter through the use of classification approach. Shows the process of development control and rights management for users of the Web site.