THE ASPECT OF INFORMATION SECURITY IN MODERN CRM-SYSTEMS IN THE ERA OF DIGITALIZATION OF THE ECONOMY AND BUSINESS

Authors

DOI:

https://doi.org/10.32851/tnv-tech.2022.5.3

Keywords:

digitalization of the economy, information security, unauthorized access, authorization protocol, CRM-platform, CRM-system

Abstract

The subject of the article is the application of CRM class systems in the modern economy. In the conditions of informatization of economic data of all enterprises, regardless of the forms of ownership, the importance of using CRM-systems is growing rapidly. Modern CRM-systems allow businesses to make high-quality and timely management decisions based on data received from CRM-class systems. Of course, one should not forget about information security, which consists in the protection of data from unauthorized access. Data protection is one of the main parameters for choosing a CRM-system. Therefore, as a result, the problem of CRM-systems arises, which consists in finding a compromise between security characteristics and ease of use, so the goal of this article is precisely to achieve the necessary information security with the maximum comfort of users of this system. The article examines the peculiarities of digitalization of the economic sector by combining CRM-systems with modern frameworks and IT-security technologies. The features of the functioning of the modern digital market, CRM-systems and security technologies are analyzed. The main modern technologies, standards and security protocols in the conditions of digitization are considered. The principles of security and convenience, on which CRM-systems should be based, are highlighted. In this study, the advantage in terms of efficiency, convenience, safety and security was given to the Oauth2 protocol and the technology implemented by Keycloak. Data security in the proposed CRM-system is ensured by flexible access settings. These two powerful tools allow you to protect any resource from unauthorized access without transferring important user data to another party and provide quite convenient options and alternatives for authorization. Using these technologies when developing your own CRM or integrating them into an already ready system is almost the best security solution.

References

Data processing in the system of residual classes / Krasnobayev V. et al. USA, Nevada : ASC Academic Publishing, 2019. 208 p. ISBN: 978-0-9989826-6-3 (Hardback), ISBN: 978-0-9989826-7-0 (Ebook)

Bosilca G., Delmas R, Dongarra J., Langou J. Algorithm-based fault tolerance applied to high performance computing. Journal of Parallel and Distributed Computing. Academic Press, Inc. Orlando, FL, USA, 2009. Vol. 69. №4. P.410-416.

The Morgan Kaufmann Series in Computer Architecture and Design by David A. Patterson / under the editorship Morgan Kaufmann, 1 edition, 2016. 720 p. ISBN-10: 0128017333, ISBN-13: 978-0128017333.

David A. Patterson, John L. Hennessy. Computer Organization and Design, Fifth Edition: The Hardware/Software Interface. Morgan Kaufmann Publishers Inc. San Francisco, CA, USA, 2013. 800 p. ISBN-13: 978-0124077263, ISBN-10: 0124077269.

Vears R. E. Microprocessor Based Systems for the Higher Technician. Kindle Edition. Newnes, 2016. 298 р.

Woods J. Stability of 2-D causal digital filters, using the residue theorem. IEEE Trans. Acoust. Signal Processing. New York, 1983. Vol. 31. № 3. P. 772-774.

Акушский И. Я. Машинная арифметики в остаточных классах. М.: Радио и связь, 1968. 444 с.

Krasnobayev V., Yanko A. and Koshman S. A Method for arithmetic comparison of data represented in a residue number system. Cybernetics and Systems Analysis, 2016. Vol. 52. Issue 1. P. 145-150.

Published

2022-12-26

How to Cite

Янко, А. С., & Торбенко, О. С. (2022). THE ASPECT OF INFORMATION SECURITY IN MODERN CRM-SYSTEMS IN THE ERA OF DIGITALIZATION OF THE ECONOMY AND BUSINESS. Таuridа Scientific Herald. Series: Technical Sciences, (5), 21-26. https://doi.org/10.32851/tnv-tech.2022.5.3

Issue

Section

COMPUTER SCIENCE AND INFORMATION TECHNOLOGY