{"title":"Cybersecurity issues of pension payments","authors":"Z. Szabó","doi":"10.1109/SISY.2017.8080569","DOIUrl":null,"url":null,"abstract":"One of the most valuable assets of economic and social life is information. Information is a resource for organizations, the basis for efficient operation, an asset, and often also a product that is sold. Cybersecurity is rarely thought of as a problem, yet, actions taken to protect information are everywhere in our lives. There are processes that can be a critical problem in the operation of an organization if the operation of the organization is not controlled properly and the organization is not well-prepared to avert a possible disaster. This study summarizes the background of the theoretical planning of an IT security system and shows an example of its possible implementation through a case study.","PeriodicalId":352891,"journal":{"name":"2017 IEEE 15th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"58 4","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 IEEE 15th International Symposium on Intelligent Systems and Informatics (SISY)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SISY.2017.8080569","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
One of the most valuable assets of economic and social life is information. Information is a resource for organizations, the basis for efficient operation, an asset, and often also a product that is sold. Cybersecurity is rarely thought of as a problem, yet, actions taken to protect information are everywhere in our lives. There are processes that can be a critical problem in the operation of an organization if the operation of the organization is not controlled properly and the organization is not well-prepared to avert a possible disaster. This study summarizes the background of the theoretical planning of an IT security system and shows an example of its possible implementation through a case study.