Problems Of Formation Of The Enterprise Digital Security System

Abstract

The article is devoted to the problems of creating an enterprise digital security system. The main objectives of the study: to consider modern approaches to the definition of the concept of "security system" and highlight its main features; identify the problems of the formation of the digital security system of the enterprise; to offer quantitative indicators of the integrated assessment of the formed digital security system of the enterprise. To study approaches to the definition of the concept of "security system" and highlight its main features, a comparative analysis is used. To assess the level of security and the effectiveness of the security system, a coefficient method is proposed. A formal logical approach is used to calculate an effective level of security. The main problems of the formation of the enterprise’s digital security system include: creating a subsystem for managing the enterprise’s digital security system; selection of physical and virtual means, methods and measures designed to ensure digital security; categorization of digital assets of an enterprise by the criterion of value; identification and assessment of digital risks. The following indicators are proposed for a quantitative assessment of the adequacy of the formed security system: the level of security that characterizes the adequacy of the enterprise’s digital security system to existing external and internal risks, and the effectiveness of the security system, which characterizes the rationality of spending money on the enterprise’s digital security system.

Keywords: Problemssystem formationsecurity systemdigital securityenterprise

Introduction

The active development of the digital economy now poses new challenges for the activities of enterprises of all types and forms of ownership. The speed and level of adaptation to ongoing changes is becoming a prerequisite for the survival of the enterprise in the market and its competitiveness (Keyun, 2019). Moreover, there is a steady trend towards the further development and deepening of the digitalization process. In the near future, the fifth generation 5G wireless network deployment process will have the most significant impact on the market. This will further accelerate the digitalization process and lead to new opportunities and new threats for enterprises (Gunter, 2017).

Problem Statement

The emergence of the digital economy, in addition to the obvious advantages, has also brought a number of negative phenomena that can cause damage to a particular enterprise. We are talking about digital risks as a special kind of economic risks. One of the main digital risks of global importance is the digital divide. The essence of this problem is that individual entities and their groups have disproportionate access to digital resources (Weise, 2018). Moreover, this problem is not only economic, but also political in nature, since it violates the democratic principles of the structure of society and can lead to the emergence of a digital dictatorship. To illustrate the scale of this problem, we present Table 1 .

Table 1 -
See Full Size >

As can be seen from Table 1 , only 10 countries from 195 independent states of the world possess the main computing potential of supercomputers, that is, about 5 %. Moreover, even among these ten countries there is a monstrous imbalance. If we compare the number of supercomputers with the leader of this rating – China and the "outsider" – Italy, we get: 228/5 = 45.6, that is, the difference is almost 50 times. Based on the above calculations, the current situation can be called critical.

Another obvious problem is a sharp increase in the global volume of information and its traffic (see table 2 ). This leads to increased requirements for the computing power of devices and their memory. In addition, information processing algorithms are becoming more complicated.

Table 2 -
See Full Size >

Based on the data in table 2 , we calculate the level of average annual increase in global Internet traffic ( G I ) in the periods indicated in the table:

G I 2002 - 2007 = 2000 - 100 2007 - 2002 = 380 G B / s e c (1)

G I 2007 - 2017 = 46000 - 2000 2017 - 2007 = 4400 G B / s e c (2)

G I 2017 - 2022 = 150700 - 46000 2022 - 2017 = 20940 G B / s e c (3)

As can be seen from the above calculations, the rate of average annual growth in global Internet traffic is constantly increasing.

The problems discussed determine the need for the formation of a digital security system at all enterprises that intend to continue and develop their activities in the market and be competitive. But this process is not typical and standardized in full, it requires taking into account the characteristics of each particular enterprise and the conditions for their functioning.

Research Questions

The main objectives of the study: to consider modern approaches to the definition of the concept of "security system" and highlight its main features; identify the problems of the formation of the digital security system of the enterprise; to offer quantitative indicators of the integrated assessment of the formed digital security system of the enterprise.

Purpose of the Study

The purpose of the study is to identify the problems of forming a digital security system of an enterprise. This will allow us to formulate a methodology for creating an enterprise’s digital security system in further research on this issue, which would be an excellent reference point for each enterprise that is aware of the existence of digital risks and the consequences of their implementation.

Research Methods

To study approaches to the definition of the concept of "security system" and highlight its main features, a comparative analysis is used. To assess the level of security and the effectiveness of the security system, a coefficient method is proposed. A formal logical approach is used to calculate an effective level of security.

Findings

First of all, it is necessary to define the concept of “security system” for this; we will consider the various approaches presented in table 3 .

Table 3 -
See Full Size >

Summarizing the approaches presented in table 3 , we can conclude that the concept of "security system" can be considered both in a broad sense and in a narrow one. In a narrow sense, a security system is a software and / or hardware complex that performs one or more tasks of protecting an enterprise. In a broad sense, the security system has the following main features:

  • value orientation: the main function of the security system is the protection of objects of value to the enterprise;

  • anti-risk nature: the features of the security system are due to the presence of risks in the external and internal environment of the enterprise;

  • the variability of the forms of the security system: the use of physical and / or virtual forms;

  • instrumentality of the security system: the availability of a set of means, methods and security measures;

  • integrity of the security system: the presence of interconnections between the elements of the security system;

  • security system focus: the main purpose of the security system is to ensure the safe state of the protected object;

  • manageability of the security system: the availability of a system for collecting information from the management of the security system.

Based on the selected features, the following author’s definition can be formulated: a security system is a managed combination of interconnected physical and virtual means, methods and measures designed to ensure the safety of valuable objects in the presence of external and internal risks.

Based on the author’s definition proposed above, the following problems of forming the enterprise’s digital security system can be distinguished:

1) creation of a subsystem for managing the enterprise’s digital security system;

2) the choice of physical and virtual means, methods and measures designed to ensure digital security;

3) categorization of digital assets of the enterprise by the criterion of value;

4) identification and assessment of digital risks.

The enterprise digital security management system subsystem should include the elements shown in Figure 1 .

Figure 1: Elements of the enterprise digital security management system subsystem (Amoroso, 2019)
Elements of the enterprise digital security management system subsystem (Amoroso, 2019)
See Full Size >

The abundance of elements of the control subsystem of the digital security system of the enterprise, as well as their specificity, raises the problem of the impossibility of applying traditional management methods. Moreover, the implementation of such a subsystem requires the active introduction of automated planning, organization, control, etc. In addition, there is no possibility of typing the management subsystem, since each enterprise needs an individual security system architecture based on the resources it has and those conditions in which it operates.

The problem of the choice of methods for ensuring digital security gives rise to the need for careful study of the principles of their classification, assessment and the possibility of combination. The complexity is also the fact that the methods for ensuring digital security of an enterprise are heterogeneous, they are divided into two groups:

1) internal – methods that are developed by the enterprise;

2) external – methods that are developed outside the enterprise:

a) outsourcing methods – methods that are developed by third parties by order of this company;

b) collective methods – methods that are developed by a business combination;

c) legislative methods:

  • legislation on information;

  • legislation on state, professional and commercial secrets;

  • legislation on personal data;

  • legislation on electronic digital signature.

The problem of categorizing digital assets is the need to develop clear criteria and an assessment methodology. In addition, it is necessary to standardize the concept of “digital asset” for its uniform application and full coverage of all manifestations of this concept. Existing approaches to the definition of “digital assets” are presented in table 4 .

Table 4 -
See Full Size >

Based on the definitions presented in table 4 , you can select the following types of digital assets:

1) digital data (content);

2) digital goods;

3) digital services;

4) digital technology;

5) digital platforms.

The problems of identifying and assessing digital risks are associated primarily with the fact that they are global in nature and can hardly be localized. In addition, the realization of many digital risks may not be noticeable. For example, an attacker illegally copied data from a digital document, but the document itself was not deleted or corrupted. In this case, in the absence of a special security system, this violation cannot be detected. Digital risks can be classified according to the following criteria:

1) by source of occurrence:

a) natural – arise due to the action of the forces of nature;

b) man-made – arise for technical reasons;

c) anthropogenic – arise due to the action of the human factor;

2) by object:

a) the risks of digital data;

b) the risks of digital infrastructure;

c) risks of digital processes:

  • risks of data generation;

  • communication risks;

  • data processing risks;

  • risks of data storage.

The solution to the above problems will allow a particular company to create its own digital security system. However, like any utilitarian system, it requires a quantitative and qualitative assessment, which would allow to determine the result of the formation and reasonably make management decisions in the field of functioning and development of the digital security system. We propose the use of the following quantitative indicators of assessment:

`1) security level (SL) – characterizes the adequacy of the enterprise’s digital security system to existing external and internal risks:

S L = 1 - R D P D * 100 % ,

R D = M a D + M o D + P h D ,

P D = D * R ,

where RD is the real damage received by the enterprise, monetary units; PD – potential damage, monetary units; MaD – the amount of material damage that has occurred, monetary units; MoD – the amount of moral damages, monetary units; PhD – the amount of physical damage that has occurred, monetary units; D – the amount of possible future damage, monetary units; R – risk level (probability of damage), fractions of a unit.

2) the effectiveness of the security system (SE) – characterizes the rationality of spending money on the digital security system of the enterprise:

S E = 1 - S S E P D - R D ,

where SSE – security system costs, monetary units.

Combining the two indicators proposed above, we obtain an integrated indicator for assessing the enterprise’s digital security system: effective security level (ES):

E S = S L * S E 100 = 1 100 * 1 - R D P D * 100 % * 1 - S S E P D - R D * 100 % =

= 1 - S S E P D - R D - R D P D + R D * S S E P D * P D - R D * 100 % =

= 1 - S S E * P D + R D * P D - R D P D * P D - R D + R D * S S E P D * P D - R D * 100 % =

= 1 + - S S E * P D - R D * P D + R D 2 + R D * S S E P D * P D - R D * 100 % =

= 1 + - S S E * P D - R D - R D * P D - R D P D * P D - R D * 100 % = 1 - S S E + R D P D * 100 %

For a qualitative assessment of the enterprise’s digital security system, we suggest qualifying it with the help of the Security System Quadrant (see table 5 ).

Table 5 -
See Full Size >

Based on the categorization of the digital security system by Quadrant, an enterprise can choose a strategy for the further development of this system:

1) with a minimum security system – a strategy for reforming the system;

2) in case of a deficient security system – a strategy for improving the risk management system;

3) with an expensive security system – restructuring the costs of the system;

4) with an optimal security system – adaptation of the system to future changes in the external environment.

Conclusion

Thus, a security system is understood as a manageable combination of interconnected physical and virtual means, methods and measures designed to ensure the safety of valuable objects in the presence of external and internal risks. The main problems of creating a digital security system of an enterprise are: the creation of a subsystem for managing a digital security system of an enterprise; selection of physical and virtual means, methods and measures designed to ensure digital security; categorization of digital assets of an enterprise by the criterion of value; Identification and assessment of digital risks. The following indicators are used to quantify the adequacy of the formed security system: the security level, which characterizes the adequacy of the enterprise’s digital security system to existing external and internal risks, and the effectiveness of the security system, which characterizes the rationality of spending money on the enterprise’s digital security system. An effective level of security can be used as an integral indicator of evaluating an enterprise’s digital security system.

References

  1. Amoroso, G. (2019). Outlook for fifty cyber security control. TAG Cyber Security Annual, 1. Retrieved from: https://www.tag-cyber.com/annuals/Volume_1_- _2019_TAG_Cyber_Security_Annual.pdf
  2. Aryamov, A., Grachova, V., Chuchaev, I., & Malikov, V. (2019). Digital asset as an object legal regulation. Ekonomika, Journal for Economical Theory and Practice and Soc.ial Issues, 65(2), 1–11. https://doi.org/
  3. Dialog Group of Companies. (2019). Security system. Retrieved from: http://dialog-e.ru/solutions/security-system/
  4. Digital Asset Working Group. (2019). Digital Asset Working Group Report June 2019. Retrieved from: https://www.r3.com/wp-content/uploads/2019/07/DigitAssetWorkingGroupReport.June2019.pdf
  5. Digital Economy Report, UNCTAD. (2019). Retrieved from: https://unctad.org/en/PublicationsLibrary/der2019_overview_en.pdf
  6. Gunter, S. (2017). Digitally Secure Transformation. ITNOW, Oxford University Press, 59(2), 12–13. https://doi.org/
  7. Hi-news.ru. (2019). Security system. Retrieved from: https://hi-news.ru/tag/sistema-bezopasnosti
  8. Keyun, R. (2019). Digital Assets as Economic Goods. Digital Asset Valuation and Cyber Risk Management (pp. 1–28). Academic Press.
  9. Kud, A. A. (2019). Substantiation of the Term “Digital Asset”: Economic and Legal Aspects. International Journal of Educational and Science, 2, 1.
  10. Retail-loyalty. (2019). Security system. Retrieved from: https://www.retail-loyalty.org/journal_retail_loyalty/about/
  11. The TOP500 project. (2019). The top 500 List of the 500 most powerful commercially available computer systems. Retrieved from: https://www.top500.org/lists/2019/11/highs
  12. Weise, A. (2018). Digital Security – Wie Unternehmen den Sicherheitsrisiken des digitalen Wandels trotzen. In: Lars Fend, Jürgen Hofmann (eds.) Digitalisierung in Industrie-, Handels- und Dienstleistungsunternehmen (pp. 243–262).
  13. Wikipedia. (2019). Digital asset. Retrieved from: https://en.wikipedia.org/wiki/Digital_asset

Copyright information

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.

About this article

Publication Date

07 December 2020

eBook ISBN

978-1-80296-095-2

Publisher

European Publisher

Volume

96

Print ISBN (optional)

-

Edition Number

1st Edition

Pages

1-833

Subjects

Management, human resources, resource efficiency, investment, infrastructure, research and development

Cite this article as:

Tantsyura, M. Y., Shtofer, G. A., Shamileva, E. E., & Olkhovaya, G. V. (2020). Problems Of Formation Of The Enterprise Digital Security System. In A. S. Nechaev, V. I. Bunkovsky, G. M. Beregova, P. A. Lontsikh, & A. S. Bovkun (Eds.), Trends and Innovations in Economic Studies, Science on Baikal Session, vol 96. European Proceedings of Social and Behavioural Sciences (pp. 618-626). European Publisher. https://doi.org/10.15405/epsbs.2020.12.80