Kontaktujte nás | Jazyk: čeština English
dc.title | Bezpečnost (podnikových) informačních systémů | cs |
dc.title | Security of firms information systems | en |
dc.contributor.author | Jašek, Roman | |
dc.relation.ispartof | E+M Ekonomie a Management | |
dc.identifier.issn | 1212-3609 Scopus Sources, Sherpa/RoMEO, JCR | |
dc.date.issued | 2005 | |
utb.relation.volume | 8 | |
utb.relation.issue | 3 | |
dc.citation.spage | 136 | |
dc.citation.epage | 143 | |
dc.type | article | |
dc.language.iso | cs | |
dc.publisher | Technická univerzita v Liberci | cs |
dc.relation.uri | http://www.ekonomie-management.cz/archiv/vyhledavani/detail/248-bezpecnost-podnikovych-informacnich-systemu-v-komplexnim-pohledu/ | |
dc.subject | vnější bezpečnost | cs |
dc.subject | vnitřní bezpečnost | cs |
dc.subject | komunikační bezpečnost | cs |
dc.subject | bezpečnost informací | cs |
dc.subject | Trusted Computing Base | en |
dc.subject | Information Security | en |
dc.subject | Computer Security | en |
dc.subject | Data Security | en |
dc.subject | Communication Security | en |
dc.description.abstract | S rozvojem informačních technologií vzrůstají i možnosti jejich zneužívání. Příspěvek představuje jeden z pohledů na bezpečnost informačních systémů. Ukazuje analogické principy jak pro podnik, tak pro státní instituci. Je charakterizováno pojetí bezpečnostních funkcí a mechanizmů, bezpečnostní politika, hierarchická struktura bezpečnostní politiky, vnější bezpečnost, vnitřní bezpečnost, proces výstavby bezpečnosti informačního systému a naplňování požadavků integrity dat. | cs |
dc.description.abstract | The security of information systems is based upon three basic building blocks, these are: the Security Policy, External Security, and i"nternal Security of information technology systems. It is possible to consider all elements as "classical", and their resolution in the main does not directly correspond to developments in information technologies. This development is profoundly influenced by the last of these basic elements of security, i.e. security measures implemented within an information technology. It is possible to break down this security aspect into several sub-components. Some of which have already been theoretically as well as practically dealt with. This cannot however be said in full for areas corresponding to the integrity of data and indirectly, with the integrity of the overall system. It is precisely this issue of integrity in the form of data protection that is today being devoted increased levels of attention, since it is impossible to resolve and assure it on a general basis - in contrast to the majority of other security functions. Data security integrity is always closely associated with concrete implementations of information systems, since the data integrity function has to ensure the correctness and consistency of the data being administered - including its relationship to the real world. It is clear that the absolute enforcement of data integrity is not realistic, and that security functions must attempt to minimalise any insufficiencies. In view this situation leads to the necessity for transferring part of the security problem and attendant issues directly into the creation of those applications themselves that are directly associated with the solutions designed for a concrete system, and the consistent enforcement of the functions and mechanisms of data processing management.of these facts, the enforcement of a commensurate degree of data integrity is projected onto the necessity for the enforcement of the correct and approved procedures for administering and working with data. | en |
utb.faculty | Faculty of Management and Economics | |
dc.identifier.uri | http://hdl.handle.net/10563/1003414 | |
utb.identifier.obdid | 13553109 | |
utb.source | j-orig | |
dc.date.accessioned | 2013-07-27T14:56:02Z | |
dc.date.available | 2013-07-27T14:56:02Z | |
dc.rights | Attribution-NonCommercial 4.0 International | |
dc.rights.uri | https://creativecommons.org/licenses/by-nc/4.0/ | |
dc.rights.access | openAccess | |
utb.contributor.internalauthor | Jašek, Roman | |
utb.fulltext.affiliation | Mgr. Roman Jašek, Ph.D. Univerzita Tomáše Bati ve Zlíně, Fakulta managementu a ekonomiky, Ústav informatiky a statistiky, Mostní 5139 , 76001 Zlín ; jasek@fame.utb.cz | |
utb.fulltext.dates | Doručeno redakci: 20. 4. 2005 Recenzováno: 29. 5. 2005 Schváleno k publikování: 7. 7. 2005 | |
utb.fulltext.sponsorship | - | |
utb.fulltext.projects | - | |
utb.fulltext.faculty | Faculty of Management and Economics | |
utb.fulltext.ou | Department of Informatics and Statistics | |
utb.identifier.jel | - |