Russian Federation
The article discusses the process of building information protection in the information system of an enterprise using the “complete overlap” model, thanks to which it is possible to find the optimal composition of the means for building an information protection system in the information system of an enterprise or organization.
information protection, information system, threats, automation system
1. Baranova E.K., Babash A.V. Modelirovanie sistemy zaschity informacii. Praktikum : ucheb. posobie. – 2-e izd., pererab. i dop. – M.: RIOR: INFRA-M, 2016. – 224 s.
2. Lucenko I.V. Modelirovanie processa zaschity informacii na promyshlennom predpriyatie // Prioritetnye napravleniya innovacionnoy deyatel'nosti v promyshlennosti. – 2024. – S. 143-145.
3. Rytov M.Yu. Ispol'zovanie specializirovannoy SAPR dlya proektirovaniya kompleksnyh sistem zaschity informacii / M.Yu. Rytov, I.V. Lucenko, M.A. Lucenko // Innovacionnye, informacionnye i kommunikacionnye tehnologii. – 2018. – № 1. – S. 100-104. EDN: https://elibrary.ru/YWAVVR