
profit  for  the  organization.  Information  security 
threats have a different nature of origin, they can be 
internal,  external,  passive,  active,  intentional  and 
unintentional, natural and artificial. 
The  main  task  of  information  security  at  an 
enterprise is to ensure the information environment, 
first of all, confidentiality, integrity and availability 
(Litvintseva  and  Karelin,  2020).  To  ensure 
information security, organizations develop and use 
an information security model, which should include 
a set of relevant internal and external factors and their 
impact  on  the  state  of  information  security  at  the 
facility and the safety of information resources. 
The  information  security  model  shows  that  the 
owner of information, in an effort to save the resource 
and reduce the risk of information security, applies 
countermeasures,  vulnerabilities,  which  depend  on 
the impact of threats. Information security threats are 
created by violators, and as a result, risks arise that 
incur losses for the resource. To ensure an effective 
information security system, methods and tools used 
for protection are being developed. 
Information  security  methods  and  tools  can  be 
divided into two areas, such as hardware and software 
security  (formal)  and  information  security  through 
communication channels (informal). 
Instruments of informal methods of information 
protection are normative (legislative), administrative, 
organizational acts and moral and ethical standards, 
which include: documents, rules, activities enshrined 
in the organization (Malyuk, 2016). 
In the meantime, there is no need to worry about 
it.  In  order  to  effectively  and  expediently  use 
information  security  methods  and  tools,  an 
organization must have the ability to make optimal 
organizational and management decisions in the field 
of  information  security.  Also  be  able  to  apply  the 
basic laws of creation and principles of functioning of 
systems  of  economic  security  and  information 
security,  be  able  to  collect,  analyze,  systematize, 
evaluate  and  interpret  the  data  necessary  to  solve 
professional problems related to information security. 
One  of  the  important  manifestations  of  the 
influence of information security tools and methods 
on  the  economic security of  an  organization  is the 
financial  component.  Any  information  security 
planning requires an expense from the organization. 
Organizational costs can be divided into capital 
and operating costs. 
Capital  expenditures  include:  costs  of  network 
and  telecommunications  equipment,  system  and 
hardware, software, buildings and premises required 
to ensure information security. 
Operating  costs  are  current  costs  and  include: 
personnel costs, telecommunications costs and other 
expenses. 
Analysis  of  information  security  risks  in  an 
enterprise is a complex process, since it is not always 
possible  to  give  an  accurate  cost  estimate  of  an 
information asset of an enterprise and to determine 
the degree of vulnerability of an asset. The essence of 
risk management at an enterprise is to assess the size 
of  risks,  formulate  effective  and  cost-effective 
measures to reduce risks, check whether the values of 
risks  are  within  an  acceptable  framework 
(Chichkanov et al., 2020). 
 The first stage is the collection and processing of 
information related to risks. This stage can be called 
preparation  for  an  information  security  risk 
assessment, which includes: 
-  definition  of  the  area  in  which  the  risk  is 
investigated; 
- identification of valuable information assets; 
- further assets are grouped by category; 
-  identification  of  all  possible  threats  to 
information security that can damage the information 
of the enterprise and affect its economic security; 
-  the  probability  of  the  onset  of  information 
security threats is determined; 
- determination of the level of damage. 
Next,  a  risk  assessment  is  carried  out,  which 
includes risk analysis and risk assessment. 
At  the  initial  stage,  the  risk  is  assigned  a 
qualitative probability score from 1 to 5 and a score 
is given using the matrix. Let's consider the main risks 
of information security in the company and give them 
an assessment, including the likelihood and scale of 
costs using the matrix. 
Risks  ranging  from  1  to  5  are  low.  With  an 
indicator  of  6-10,  they  have  an  average  degree  of 
damage. If the indicator is from 11 to 15, then the risk 
is already considered high, and if the indicator is more 
than 15, then the risk belongs to extremely high risks. 
The  risk  of  confidential  information  leakage  is 
frequent, since all employees of the enterprise have 
confidential information to one degree or another and 
can  pose  a  threat  to  information  security,  but  at 
different scales of valuation, the classification of risk 
according  to  the  degree  of  consequences  will  be 
different. So, in  the event of a leak of information 
related to the salary of a full-time employee, the risk 
will be considered low, and in the event of a leak of 
information related to a business strategy or a trade 
secret, the risk will already be high. 
Using this matrix, it is possible  to correlate the 
impact  of  information  security  risks  on  economic 
security, since, depending on the value of the asset, 
Information Security in the System of Economic Security of Companies
153