PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Analysis of Information Security Threats for Developing DLP-systems

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
The motivation of investigation is explained by the problem of keeping organisations’ information and private ones secure. One reason for this is insufficiency of information protection systems, and another – vulnerability in such kind of systems. The article is devoted to defining and analyzing the types and sources of information security threats for an automated system. It can be useful for developing the model method, having the purpose of detecting and further preventing of hazards. The safeness of Data Leak Prevention (DLP) system itself is also under investigation. The analysis was carried out by an expert method with system analysis. A DLP system was considered, on the one hand, as a way of information protection to prevent information leakage, and on the other hand, as an object of protection which is vulnerable to threats of information security. The presented threat model includes the sources of threats, divided into three large groups: anthropogenic, technogenic and spontaneous; and types of threats: intentional and unintentional.
Rocznik
Tom
Strony
25--28
Opis fizyczny
Bibliogr. 14 poz., rys.
Twórcy
autor
  • Information Security, Information Technology and Data Protection Department, the Ural State University of Railway Transport, Kolmogorov Street, 66, Yekaterinburg RUSSIA
autor
  • Linguistics, Logistics specialist, Associate Professor of Foreign Languages and Intercultural Communication Department, the Ural State University of Railway Transport, Faculty of Economics and Administration, Kolmogorov Street, 66, Yekaterinburg RUSSIA
Bibliografia
  • 1. AHMAD A., BOSUA R., SCHEEPERS R. 2014. Protecting organizational competitive advantage. A knowledge leakage perspective. Computers & Security, Vol. 42, 27-39. DOI: 10.1016/j.cose.2014.01.001.
  • 2. ALNEYADI S., SITHIRASENAN E., MUTHUKKUMARASAMY V. 2016. A survey on data leakage prevention systems Journal of Network and Computer Applications, Vol. 62, 137-152. DOI: 10.1016/j.jnca.2016.01.008.
  • 3. BORIDKO I. S. ET AL. 2013. DLP-systems: insider protection, Security of information technology, 1, 82-84, ISSN: 2074-7128eISSN: 2074-7136.
  • 4. COMPARISON LEAKAGE PROTECTION SYSTEMS (DLP) 2014. Part 1, URL: https: //www.anti mal-ware.ru/comparisons/data_leak_protection_2014_part1.
  • 5. COMPARISON LEAKAGE PROTECTION SYSTEMS (DLP) 2014. Part 2, URL: https://www.anti-malware.ru/comparisons/data_leak_protection_2014_part2.
  • 6. ESET PRESS-CENTRE 2014. URL: https://www.esetnod32.ru/company/press/center/38-sotrudnikov-slivali-sekrety-eks-rabotodateley/.
  • 7. GOST P 51275-2006. Data protection. information of the object. Factors affecting the information. General Provisions.
  • 8. GRUDZIEŃ Ł., HAMROL A. 2016. Information quality in design process documentation of quality management systems. International Journal of Information Management, Vol. 36 (4), 599-606. DOI: 10.1016/j.ijinfomgt.2016.03.011.
  • 9. INFOWATCH ANALYTICAL CENTER REPORT DATA LEAKAGE. Russia. 2016. URL: https://www.infowatch.ru/analytics/reports/17962.
  • 10. KATZ G., ELOVICI Y. SHAPIRA B. 2014. CoBAn. A context based model for data leakage prevention. Information Sciences, Vol. 262, 137–158. DOI: 10.1016/j.ins.2013.10.005.
  • 11. SHAMALA P., AHMAD R., ZOLAIT A., SEDEK M. 2017. Integrating Infor-mation Quality dimensions into information security risk management (ISRM). Journal of Information Security and Applications, Vol. 36, 1-10. DOI: 10.1016/j.jisa.2017.07.004.
  • 12. SULAVKO A. Y. 2014. Technologies of protection from inner threats of information security, Bulletin of the Siberian State Automobile and Highway Academy.
  • 13. XU CHANGBAO, ZHAO YANLONG, ZHANG JI-FENG, QI HONGSHENG 2017. System Identification under Information Security. IFAC-PapersOnLine, Vol. 50 (1), 3756–3761. DOI: 10.1016/j.ifacol.2017.08.477.
  • 14. ZYWIOŁEK J. 2016. The application of value stream mapping method for identifying basic drawbacks and reducing duration of information process in a company, Production Engineering Archives, Vol. 11, No. 2, 36-39.
Uwagi
Opracowanie rekordu w ramach umowy 509/P-DUN/2018 ze środków MNiSW przeznaczonych na działalność upowszechniającą naukę (2018).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-4d2f448f-2b63-4cef-967e-bcdfa29c4924
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.