DOI: https://doi.org/10.36719/2789-6919/56/200-206
Jamila Gurbanli
Azerbaijan State Oil and Industry University
Master's student
https://orcid.org/0009-0001-7300-7612
qurbanlicemile344@gmail.com
Ensuring Security in Information Systems: Methods and Approaches
Abstract
In the modern information society, computer systems and information-computing networks (ICNs) have become an integral component of social, economic, and administrative processes. The continuous growth in both the volume and significance of the data processed within these systems brings information security to the forefront as a priority issue. Information security is understood as the state of protection of information and its supporting infrastructure against accidental or intentional internal and external threats.
Ensuring security in automated information processing systems (AIPS) is not limited to technical measures alone; it also requires the comprehensive implementation of administrative and organizational controls. In this context, the development of a security policy, risk analysis, the implementation of authentication and authorization mechanisms, as well as the establishment of logging and audit systems are of particular importance. At the same time, cryptographic protection of data within networks and anti-malware defense mechanisms plays a key role in preventing information leakage.
Research indicates that ensuring the fundamental components of information security – availability, integrity, and confidentiality – is possible only through a systematic and integrated approach. Therefore, the deployment of secure networks and the application of modern security methods constitute the primary condition for the reliable operation of information systems.
Keywords: information security, Automated Information Processing System (AIPS), security policy, logging and audit, cryptography, risk management