THE APPROACHES TO THE INFORMATION PROTECTION IN ELECTRONIC DOCUMENT FLOW SYSTEMS
Keywords:electronic document, electronic document management system, Data Protection, encryption.
AbstractAgainst the background of events that today in Ukraine and the world, as well as in mass distribution of electronic computer engineering and unauthorized actions on information it is necessary to more thoroughly protect the public, industrial, commercial and financial secrecy. Information security in general and protection of information in automated systems in particular, becomes more urgent and complex problem, whose solution must involve more skilled personnel and organizations specializing in the protection of information. For a quick and good governance in the institutions of different levels are increasingly introducing electronic document management systems that are not fully protected from malicious attacks plaguing useful purpose in the damage caused by a particular organization. In order to preserve the confidentiality, integrity and availability of information circulating in electronic document systems currently used by a number of methods and means of information protection
The Law of Ukraine (2003), On electronic documents and electronic document. [Pro elektronni dokumenty ta elektronnyy dokumentoobih], The Verkhovna Rada of Ukraine, http://zakon4.rada.gov.ua/laws/show/851-15.
Law of Ukraine (2003), On electronic digital signature. [Pro elektronnyy tsyfrovyy pidpys], The Verkhovna Rada of Ukraine, http://zakon4.rada.gov.ua/laws/show/852-15.
The Cabinet of Ministers of Ukraine № 680 (2004), On approval of the testimony of the presence of an electronic document (electronic data) for a certain time. [Pro zatverdzhennya Poryadku zasvidchennya nayavnosti elektronnoho dokumenta (elektronnykh danykh) na pevnyy moment chasu], The Cabinet of Ministers of Ukraine, http: // zakon1. rada. gov.ua/laws/show/680-2004-%D0%BF.
The Cabinet of Ministers of Ukraine № 1451 (2004), On approval of the central certification body. [Pro zatverdzhennya Polozhennya pro tsentral'nyy zasvidchuval'nyy orhan], The Cabinet of Ministers of Ukraine http://zakon4.rada.gov.ua/laws/show/1451-2004- %D0%BF.
The Cabinet of Ministers of Ukraine № 1452 (2004), On approval of the use of digital signature public authorities, local governments, enterprises, institutions and organizations of state ownership. [Pro zatverdzhennya Poryadku zastosuvannya elektronnoho tsyfrovoho pidpysu orhanamy derzhavnoyi vlady, orhanamy mistsevoho samovryaduvannya, pidpryyemstvamy, ustanovamy ta orhanizatsiyamy derzhavnoyi formy vlasnosti], http://zakon4.rada.gov.ua/laws/show/1452-2004-%D0%BF.
The Cabinet of Ministers of Ukraine № 1453 (2004), On Approval of Standard Order of electronic document circulation in executive authorities. [Pro zatverdzhennya Typovoho poryadku zdiysnennya elektronnoho dokumentoobihu v orhanakh vykonavchoyi vlady], The Cabinet of Ministers of Ukraine, http://zakon0.rada.gov.ua/laws/show/1453-2004-%D0%BF.
The Cabinet of Ministers of Ukraine № 1454 (2004) On adoption of obligatory transfer of documented information. [Pro zatverdzhennya poryadku obov"yazkovoyi peredachi dokumentovanoyi informatsiyi], The Cabinet of Ministers of Ukraine, http://zakon3.rada. gov.ua/laws/show/ 1454-2004- %D0%BF.
Dosmuhamedov B.R. (2009), Analysis of information systems threats Electronic document circulation. [Analyz uhroz ynformatsyy system еlektronnoho dokumentooborota], Provision of computer and vыchyslytelnaya technology, № 6, pp.140-143.
Lukichov V.V. (2014), Steganographic methods and means of information protection based on wavelet transformation. [Metody ta zasoby stehanohrafichnoho zakhystu informatsiyi na osnovi veyvlet-peretvoren], NTB, pp. 19-105.
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
4. Personal data and metadata contained in articles are available for storage and processing in various databases and information systems, including them in analytical and statistical reports, creating reasonable relationships of scientific , literary and art objects with personal data, etc. on an area which is not limited.