ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

ANALYSIS AND METHODS OF CYBER SECURITY OF BUSINESS STRUCTURES IN SOCIAL NETWORKS

Journal: International scientific journal "Internauka." Series: "Economic Sciences" (Vol.1, No. 86)

Publication Date:

Authors : ; ; ; ; ;

Page : 16-22

Keywords : business; business structure; cyber security; information technology; information; analytics; information law; business risks; user; corporate page; social network; result;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Introduction. Ensuring security on the Internet today is an important part of the work of world-famous companies, namely: LinkedIn, Facebook, Twitter, Instagram, which provide, support and develop social networks. Cyber security of business structures needs constant support and improvement based on analysis of its efficiency and effectiveness. This will contribute to the increase of cyber resistance and the development of the business structure in modern conditions. Purpose. The purpose of the article is to investigate the main principles of ensuring cyber security of business structures in social networks, taking into account the specifics of information law and the latest technologies. Materials and methods. Research materials are scientific and reference literature, practical experience on the outlined topic. In the research process, general scientific and special methods were used, in particular: theoretical generalization, systematization and system analysis, as well as the graphic method. Results. Theoretical provisions have been improved and practical recommendations have been developed to ensure the cyber security of business structures in social networks, taking into account the specifics of economic activity, information law and the latest technologies. The scientific novelty is the improvement of the system and mechanism of minimizing third-party (external) cybernetic influence, taking into account the corresponding consequences on the personal office of the manager (or administrator) of the business structure in social networks. A description of possible algorithms for data analysis of business structures in social networks as a data collection tool is also added. In addition, possible methods of countermeasures and increasing the security of the pages of administrators and account owners in social networks are evaluated. This is due to the fact that any information collected on the Internet can provoke attackers to launch a cyber attack. Given the impossibility of hacking social networks as a complete system, criminals use hacking of personal accounts of business leaders. The impact of business, economic connections in social networks is also considered to determine the group of people who are engaged in the promotion of goods in social networks. An analysis of the existing methods of ensuring cyber security in the most famous social networks Facebook and Instagram was carried out, taking into account the specifics of economic activity, information law and technologies. Prospects. In the future, it is recommended to study the types of information systems and technologies in areas enshrined in the integrity of business structures.

Last modified: 2024-12-15 17:12:24