Слайд 2
![Plan](/_ipx/f_webp&q_80&fit_contain&s_1440x1080/imagesDir/jpg/418165/slide-1.jpg)
Слайд 3
![1 The description of information security The global penetration of](/_ipx/f_webp&q_80&fit_contain&s_1440x1080/imagesDir/jpg/418165/slide-2.jpg)
1 The description of information security
The global penetration of information technology
into our lives, the gradual transition to electronic ways of doing business set new information security challenges for market participants.
Слайд 4
![2 The problem of studying internal threats to information security](/_ipx/f_webp&q_80&fit_contain&s_1440x1080/imagesDir/jpg/418165/slide-3.jpg)
2 The problem of studying internal threats to information security
Слайд 5
![3 The solution of these problems](/_ipx/f_webp&q_80&fit_contain&s_1440x1080/imagesDir/jpg/418165/slide-4.jpg)
3 The solution of these problems
Слайд 6
![Bibliography 1 Belyantsev A.E. Information security as the most important](/_ipx/f_webp&q_80&fit_contain&s_1440x1080/imagesDir/jpg/418165/slide-5.jpg)
Bibliography
1 Belyantsev A.E. Information security as the most important factor in
the state information policy of the Russian Federation // Bulletin of the Academy of Military Sciences. 2015. № 3 (52). Pp. 79-84.
2 Yemelyanov A.A. Experience of implementing information security policies at a small business enterprise in order to ensure information and economic security // Information Security of Russian Regions (IBRD-2015) Conference materials. 2015. p. 213-214.
Krupko A.E. Information security policy: composition, structure, audit of information security of FES // Finance. Economy 2015. No. 8. P. 27-32.