The influence of Shadow Information Technology on the cyber security of business entity
DOI:
https://doi.org/10.18372/2225-5036.24.12310Keywords:
information security, Shadow IT, Stealth IT, shadow information technologies, wearable devices, access control, firewall, business entityAbstract
The development of information technology over the past decades has led to radical changes in all the spheres of human, social and state activity: new cultural and economic trends appear, the production of information as an independent product develop, new types of social communications emerge. In this connection the information sphere of any state becomes critical and therefore needs to be protected. Particularly urgent is the issue of information security. That is why scientists actively research the issues related to a set of measures aimed at ensuring the security of information from unauthorized access, as well as studying methods and tools that ensure the integrity, confidentiality and availability of information under the influence of any threats, the realization of which can cause damage to the owners and users of information. Information security has become an integral part of national security and at the same time an important independent sphere of ensuring the safety of business entities. Nowadays the information space, infrastructure and technologies considerably influence the level and rate of social, economic and technological development. Therefore, the success of the business entity, the guarantee of profit, becomes more and more dependent on keeping production secrets, based on the intellectual potential and specific technology. Employees store data on mobile or wearable devices – and important corporate information becomes available from any laptop, smartphone or tablet that an employee uses at the office or cafe. In the paper the analysis of threat that becomes extremely urgent in the information sphere and is connected with the use of mobile or wearable devices at the workplace is performed. The definition of Shadow IT or Stealth IT is developed and the structure of possible places of the emergence of the corresponding threat is given. The suggestions on improving the operation of corporate information security units in counteracting unauthorized access to information resources are offered.References
М.О. Жованик, «Загальні принципи захисту мобільних пристроїв в корпоративній мережі», Молодий вчений, № 5 (20), с. 39-42, 2015.
ЛІГА.net, «Украина стала главной жертвой вируса Petya инфографика». URL: http://biz.liga. net/ekonomika/it/novosti/3698413-ukraina-stalaglav noy-zhertvoy-virusa-petya-infografika.htm.
Gartner «Make Mobile Part of Your Digital Workplace Strategy». URL: https://www.gartner.com /doc/3015425?ref=SiteSearch&sthkw=Shadow%20IT%20refers%20to%20IT&fnl=search&srcId=1-3478922254.
А.І. Марущак, «Структура інформаційної безпеки юридичної особи», Інформаційна безпека людини, суспільства, держави, №3-4, с. 7 9, 2012.
О.Г. Корченко, Д.А. Горніцька, А.Ю. Голо-лобов, «Розширена класифікація методів соціального інжинірингу», Безпека інформації, Т. 20, № 2, с. 197-205, 2014.
А.С. Прозоров, «Когда мало контроля ИБ», Электронный ресурс, Режим доступа: https://www. securitylab.ru/blog/personal/80na20/342486.php.
А.С. Марков, В.Л. Цирлов, «Руководящие указания по кибербезопасности в контексте ISO 27032», Вопросы кибербезопасности, № 1(2), с. 28-35, 2014.
Skyhigh «Shadow IT Security Checklist». URL: http://info.skyhighnetworks.com/CH-Shadow-IT-Security-Checklist_Banner-Cloud.html.
Joann Starke, «The Shadow IT Dilemma». URL: https://blogs.cisco.com/cloud/the-shadow-itdilemma.
Christopfer Frank, «Shadow IT». URL: https://www.forbes.com/sites/forbesproductgroup/2017/02/22/shadow-it/#66e90c3c79fd.
Mark Sutton, «Unauthorised cloud adoption growing issue for CIOs». URL: http://www.itp.net/60 3235-unauthorised-cloud-adoption-growingissuefor-cios.
Cisco «Shadow IT and Cisco Cloud Consumption Professional Services». URL: https://www.cisco.com/c/en /us/td/docs/solutions/Hybrid_Cloud/Intercloud/Intercloud_Fabric/Intercloud_Fabric_A.html.
Kasey Panetta, «Gartner’s Top 10 Security Predictions 2016» Сайт компанії «Gartner». URL: http://www.gartner.com/smarterwithgartner/top-10secur ity-predictions2016/?cm_mmc=soc ial-_-rm-_-gart-_-swg.
Facebook. URL: https://m.facebook.com/ martin.lidegaard/photos/a.451142271606144.111938.447217575331947/1215056811881349/?type=3&source=54.
Tadviser «Киберприступность в мире». URL: http://www.tadviser.ru/index.php/.
16 Статья: Киберпреступность в мире. Лабораторія Каперського. URL: https://www.kaspers ky.ru/about/press-releases/2017_kaspersky-lab-has-launched-an-active-search-service-for-cyber-attacks.