+7 (495) 987 43 74 ext. 3304
Join us -              
Рус   |   Eng

Authors

Puzynya T. A.

Degree
PhD. Sci. (Economy), Assoc., Theory and Practice of Competition Department, Moscow University for Industry and Finance «Synergy
E-mail
tatiana-puzynya@yandex.ru
Location
Moscow, Russia
Articles

Virtualization technologies and information system security

The relevance of the study is dictated by the introduction of digitalization in all spheres of human life, and timely protection of information and personal data of citizens in the first place. The objective of the study was the need to transform the methods and approaches of information protection during its transmission, creation and storage. Methodological arsenal of the study is presented by scientific methods of cognition of the studied phenomenon content, the structuring of its components and the system of generalization, and analysis of the causal relationship between the visualization functionality and information security of management decisions. The author analyzed the main virtualization technologies for digital business transformation and concluded that there is the need to improve the legal framework in this area. The significance of this article lies in the fact that the use of the virtualization method will increase the level of business security with minimal losses. Current GOST R 56938-2016 "Information protection when using virtualization technologies" does not fully reflect the issues of information protection in terms of its visualization, which leads to the need to improve the legal framework when using virtualization technologies for data protection. It is essential to pay special attention to cloud storage, collaboration and communication services, remote project management programs, cybersecurity solutions, and CRM systems. This is particularly relevant today during the emergence of virtual workplaces and transferring employees to remote work from home. Read more...