ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

MAIN MENACES OF INFORMATION LEAKAGE OF A COMMERCIAL SECRET ON THE INTERNET AND ANALYSIS OF THE PRACTICE OF PROTECTION OF COMMERCIAL SECRETS IN THE EU MEMBER STATES

Journal: International scientific journal "Internauka." Series: "Juridical Sciences" (Vol.1, No. 28)

Publication Date:

Authors : ;

Page : 38-44

Keywords : threats; information; trade secret on the Internet; intellectual property; protection of trade secret; investment;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

The article is devoted to identifying the main threats to the loss of trade secrets for legal entities and individuals in the performance of their duties at the enterprise, institutions, organizations of various forms of ownership. The main directions of possible storage of information containing a trade secret on the Internet are identified. In recent years, the increasing use of advanced IT technologies has led not only to many benefits, but also a number of problems. In particular, the level of information negative impact on the processes of storage and dissemination of information has significantly increased, the number of new threats to information security, such as new forms of cyberattacks, has increased. Ensuring the stable maximum efficient operation and development of any enterprise is the main task of security of its economic information. The most valuable economic information is accounting information that characterizes all aspects of economic activity. It is becoming clear that cybersecurity issues should be on the agenda of every company, regardless of its scale, level of complexity and nature of business, as well as aware of all employees of the company. The multifaceted approach to information resources necessitates the consideration of such an important factor as the functioning of the enterprise in market relations, a characteristic feature of which is the struggle between independent entities in the market and fierce competition between producers. The struggle for economic survival is the law of the market. Analysis of practice shows that the successful application of the method of protection against threats to the outflow of information largely depends on the correct choice, in each case, of adequate instruments, devices, equipment, as well as the compliance of technical means with the requirements of admissibility. The use of technical means, as is known, is possible if the legality, security, safety, moral and ethical norms of society are guaranteed. Uncritical perception of the disadvantages and advantages of a method of information protection can lead to serious losses in development of technical solutions for information security in corporate network. It is especially important to note that the seemingly unsuccessful attempt to intercept computer-generated electromagnetic oscillations with the help of electronic intelligence and at the same time detect a special interference generator suggests that the institution has secrets hidden at a professional level.

Last modified: 2021-03-25 00:49:39