<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2 20190208//EN" "http://jats.nlm.nih.gov/publishing/1.2/JATS-journalpublishing1.dtd">
<article article-type="research-article" dtd-version="1.2" xml:lang="ru" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"><front><journal-meta><journal-id journal-id-type="issn">2518-1092</journal-id><journal-title-group><journal-title>Research result. Information technologies</journal-title></journal-title-group><issn pub-type="epub">2518-1092</issn></journal-meta><article-meta><article-id pub-id-type="doi">10.18413/2518-1092-2024-9-1-0-3</article-id><article-id pub-id-type="publisher-id">3403</article-id><article-categories><subj-group subj-group-type="heading"><subject>INFORMATION SYSTEM AND TECHNOLOGIES</subject></subj-group></article-categories><title-group><article-title>&lt;strong&gt;ENSURING INFORMATION SECURITY&amp;nbsp;IN EXECUTIVE AUTHORITIES. PROBLEMS AND SOLUTIONS&lt;/strong&gt;</article-title><trans-title-group xml:lang="en"><trans-title>&lt;strong&gt;ENSURING INFORMATION SECURITY&amp;nbsp;IN EXECUTIVE AUTHORITIES. PROBLEMS AND SOLUTIONS&lt;/strong&gt;</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Fedorov</surname><given-names>Alexey Vasilyevich</given-names></name><name xml:lang="en"><surname>Fedorov</surname><given-names>Alexey Vasilyevich</given-names></name></name-alternatives></contrib><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Zhikharev</surname><given-names>Alexander Gennadievich</given-names></name><name xml:lang="en"><surname>Zhikharev</surname><given-names>Alexander Gennadievich</given-names></name></name-alternatives><email>zhikharev@bsu.edu.ru</email></contrib><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Kalchenko</surname><given-names>Daniil Mikhailovich</given-names></name><name xml:lang="en"><surname>Kalchenko</surname><given-names>Daniil Mikhailovich</given-names></name></name-alternatives></contrib></contrib-group><pub-date pub-type="epub"><year>2024</year></pub-date><volume>9</volume><issue>1</issue><fpage>0</fpage><lpage>0</lpage><self-uri content-type="pdf" xlink:href="/media/information/2024/1/ИТ_НР_9.1_3.pdf" /><abstract xml:lang="ru"><p>The article discusses the main problems and, accordingly, the security measures taken by executive authorities, which define goals and objectives, risk assessment. The basic principles of the choice and implementation of protective measures, the development of information security procedures and policies are considered, the main domestic information security management systems are proposed, the main forms of employee training, monitoring and actions taken based on the analysis of monitoring results are also described. The stages of incident analysis in the process of incident investigation are defined, which allow identifying vulnerabilities and problems in the security system and taking measures to eliminate them. The regular updating and improvement of the security system is due to the provision of more reliable protection against various types of threats, several recommendations are given for the revision and adaptation of information security policies in order to adapt to changing conditions and requirements. The reasons for the expediency of implementing information security management systems are given.</p></abstract><trans-abstract xml:lang="en"><p>The article discusses the main problems and, accordingly, the security measures taken by executive authorities, which define goals and objectives, risk assessment. The basic principles of the choice and implementation of protective measures, the development of information security procedures and policies are considered, the main domestic information security management systems are proposed, the main forms of employee training, monitoring and actions taken based on the analysis of monitoring results are also described. The stages of incident analysis in the process of incident investigation are defined, which allow identifying vulnerabilities and problems in the security system and taking measures to eliminate them. The regular updating and improvement of the security system is due to the provision of more reliable protection against various types of threats, several recommendations are given for the revision and adaptation of information security policies in order to adapt to changing conditions and requirements. The reasons for the expediency of implementing information security management systems are given.</p></trans-abstract><kwd-group xml:lang="ru"><kwd>information security problems</kwd><kwd>security measures</kwd><kwd>risk assessment</kwd><kwd>protective measures</kwd><kwd>information security management systems</kwd><kwd>monitoring and analysis of results</kwd><kwd>investigation of incidents</kwd><kwd>vulnerabilities and problems</kwd><kwd>revision and adaptation of information security policies</kwd><kwd>the feasibility of implementing information security management systems</kwd></kwd-group><kwd-group xml:lang="en"><kwd>information security problems</kwd><kwd>security measures</kwd><kwd>risk assessment</kwd><kwd>protective measures</kwd><kwd>information security management systems</kwd><kwd>monitoring and analysis of results</kwd><kwd>investigation of incidents</kwd><kwd>vulnerabilities and problems</kwd><kwd>revision and adaptation of information security policies</kwd><kwd>the feasibility of implementing information security management systems</kwd></kwd-group></article-meta></front><back><ref-list><title>Список литературы</title><ref id="B1"><mixed-citation>IT specialists in the field of information security in 2022. &amp;minus; URL: https://habr.com/ru/articles/679086/. &amp;ndash; [Electronic resource].</mixed-citation></ref><ref id="B2"><mixed-citation>&amp;nbsp;Cybersecurity in 2022-2023. Trends and forecasts &amp;minus; URL: https://www.ptsecurity.com/ru-ru/research/analytics/ogo-kakaya-ib/#id2. &amp;ndash; [Electronic resource].</mixed-citation></ref><ref id="B3"><mixed-citation>Foundation for the Promotion of Secure Information Technologies. Welcome, senors! Cybersecurity labor market in the third quarter of 2023. &amp;minus; URL: https://fsrbit.ru/post/2132. &amp;ndash; [Electronic resource].</mixed-citation></ref><ref id="B4"><mixed-citation>Udovichenko A. IB strategy: have you decided how to move forward? &amp;ndash; 02/27/2019 &amp;minus; URL: https://habr.com/ru/companies/softline/articles/441920/. &amp;ndash; [Electronic resource].</mixed-citation></ref><ref id="B5"><mixed-citation>AstraLinux security model &amp;mdash; the basis for testing new GOST standards &amp;ndash; 05/14/2021&amp;minus; URL: https://astralinux.ru/about/press-center/news/model-bezopasnosti-astra-linux-osnova-dlya-aprobatsii-novykh-gostov/. &amp;ndash; [Electronic resource].</mixed-citation></ref><ref id="B6"><mixed-citation>Shilyaev S. Problems of information security: algorithm for building an information security system from scratch &amp;ndash; 02/24/2015. &amp;minus; URL: https://kontur.ru/articles/1622. &amp;ndash; [Electronic resource].</mixed-citation></ref><ref id="B7"><mixed-citation>Software registry. Ministry of Digital Development, Communications and Mass Communications of the Russian Federation. &amp;minus; URL: https://reestr.digital.gov.ru/. [Electronic resource].</mixed-citation></ref><ref id="B8"><mixed-citation>Decree of the President of the Russian Federation No. 250 of 01.05.2022 on additional measures to ensure information security of the Russian Federation. &amp;minus; URL: http://www.kremlin.ru/acts/bank/47796. &amp;ndash; [Electronic resource].</mixed-citation></ref><ref id="B9"><mixed-citation>GOST R ISO/IEC 27001-2021. Information technology. Methods and means of ensuring security. Information security management systems. Requirements: national standard of the Russian Federation: official publication: approved and put into effect by the order of the Federal Agency for Technical Regulation and Metrology dated November 30, 2021 N 1653-st. &amp;minus; URL: https://garant.belregion.ru/#/document/403510768/paragraph/764/doclist/32/showentries/0/highlight/ГОСТ%20Р%20ИСО%7CМЭК%2027001-2021:2. &amp;ndash; [Electronic resource].</mixed-citation></ref><ref id="B10"><mixed-citation>GOST R ISO/IEC 27002-2021. Methods and means of ensuring security. Information technology. Methods and means of ensuring security. Code of Norms and Rules for the application of information security measures: official publication: approved and put into effect by Order of the Federal Agency for Technical Regulation and Metrology dated May 20, 2021 N 416-art. &amp;minus; URL: https://garant.belregion.ru/#/document/402878331/paragraph/1/doclist/33/showentries/0/highlight/ГОСТ%20Р%20ИСО%7CМЭК%2027002-2021:4. &amp;ndash; [Electronic resource].</mixed-citation></ref></ref-list></back></article>