|

System for analyzing and preventing threats to the security of personal data in an enterprise

Authors: Levinskiy A.T.
Published in issue: #5(34)/2019
DOI: 10.18698/2541-8009-2019-5-474


Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security

Keywords: DLP-systems, safety, efficiency, Zecurion DLP, HTTP, FTP, blocking, array, data, protocol
Published: 17.05.2019

Information security rules play a key role in ensuring the protection of systems and networks. Sophisticated, implemented, and realized information security rules will help to feel the difference between safety tips and an organized security system that functions effectively.
The topic of this article is “System for analyzing and preventing threats to the security of personal data in an enterprise”. As a result, a draft system for analyzing and preventing threats to the security of personal data in an enterprise has been developed, and a comparison with the existing analogs is given.
Security in information technology is understood as a set of measures and is perceived as a single system. Computer security can have different aspects, among which there is no more or less significant, everything is important here. One can not just give up some measures, otherwise, the system simply will not start working.


References

[1] Katorin Yu.F., Razumovskiy A.V., Spivak A.I. Zashchita informatsii tekhnicheskimi sredstvami [Hardware information protection]. Sankt-Petersburg, SPbNIU ITMO Publ., 2012 (in Russ.).

[2] Cser A. The Forrester Wave™: cloud security gateways, Q4 2016. Forrester, 2016.

[3] Shan’gin V.F. Informatsionnaya bezopasnost’ komp’yuternykh sistem i setey [Information security of computer systems and networks]. Moscow, Forum Publ., Infra-M Publ., 2017 (in Russ.).

[4] Reed B., Wynne N. Magic quadrant for enterprise data loss prevention. Gartner, 2016.

[5] Mel’nikov V.P., Kleymenov S.A., Petrakov A.M. Informatsionnaya bezopasnost’ [Information security]. Moscow, Akademiya Publ., 2017 (in Russ.).

[6] Vasil’kov A.V., Vasil’kov I.A. Bezopasnost’ i upravlenie dostupom v informatsionnykh sistemakh [Safety and access control in information systems]. Moscow, Forum Publ., 2015 (in Russ.).

[7] Russell J. Cohn R., Programming language. VSD, 2012. (Russ. ed.: Sravnenie yazykov programmirovaniya. Moscow, Bukvika Publ., 2012.)

[8] Baranov Yu.G. Metody prinyatiya upravlencheskikh resheniy [Management decision-making technique]. Pskov, PGUPubl., 2013 (in Russ.).

[9] Shcheglov A.Yu. Zashchita komp’yuternoy informatsii ot nesanktsionirovannogo dostupa [Computer information protection from unauthorized access]. Sankt-Petersburg, Nauka i tekhnika Publ., 2004 (in Russ.).

[10] Howard M., LeBlanc D., Viega J. 24 deadly sins of software security. McGraw-Hill, 2009. (Russ. ed.: 24 smertnykh grekha komp’yuternoy bezopasnosti. Sankt-Petersburg, Piter Publ., 2010.)