<p><em>The importance of using the adapted DLP-system in the «Blocking» mode of leaking confidential information of the company is investigated. The scheme of interception of information security events in the «Copy» mode is given, the analysis of which reflects the main drawback of using this mode – the DLP-system works only with copies of confidential documents, while the originals were delivered to the recipient. Such cases inflict enormous damage on companies, so the transfer of critical information beyond the corporate network is unacceptable.</em></p><p><em>A solution is proposed for transferring the operation of the DLP-system from the «Copy» mode to the «Blocking» mode. It is important that the operation of the DLP-system does not h...
The field of research that is concerned with the study of threats to the security of organizational ...
Methods and tools of unlocking data from the local network are analyzed. Modern methods and software...
Employees are the backbone of the organization, but they’re also the biggest risk to the very data t...
<p><em>Research application of DLP-system for protection of confidential information, a methodology ...
Context. Data leakage prevention (DLP), a system designed to prevent leakage and loss of secret sens...
Sensitive and confidential data are a requisite for most companies, so protection for this data take...
The motivation of investigation is explained by the problem of keeping organisations’ information an...
The motivation of investigation is explained by the problem of keeping organisations’ information an...
Protection of confidential data from being leaked to the public is a growing concern among organisat...
Abstract- Sensitive and confidential data are a requisite for most companies, so protection for this...
In today’s business world, many organizations use Information Systems to manage their sensitive and ...
It is not uncommon these days to come across security incidents involving sensitive data. Most resea...
DLP systems are designed to identify and prevent unwanted data leakage. Often, systematic blocking i...
according to the authors, every day a number of threats to information security increases, and this ...
In the paper the necessity of further introduction of modern systems of information protection again...
The field of research that is concerned with the study of threats to the security of organizational ...
Methods and tools of unlocking data from the local network are analyzed. Modern methods and software...
Employees are the backbone of the organization, but they’re also the biggest risk to the very data t...
<p><em>Research application of DLP-system for protection of confidential information, a methodology ...
Context. Data leakage prevention (DLP), a system designed to prevent leakage and loss of secret sens...
Sensitive and confidential data are a requisite for most companies, so protection for this data take...
The motivation of investigation is explained by the problem of keeping organisations’ information an...
The motivation of investigation is explained by the problem of keeping organisations’ information an...
Protection of confidential data from being leaked to the public is a growing concern among organisat...
Abstract- Sensitive and confidential data are a requisite for most companies, so protection for this...
In today’s business world, many organizations use Information Systems to manage their sensitive and ...
It is not uncommon these days to come across security incidents involving sensitive data. Most resea...
DLP systems are designed to identify and prevent unwanted data leakage. Often, systematic blocking i...
according to the authors, every day a number of threats to information security increases, and this ...
In the paper the necessity of further introduction of modern systems of information protection again...
The field of research that is concerned with the study of threats to the security of organizational ...
Methods and tools of unlocking data from the local network are analyzed. Modern methods and software...
Employees are the backbone of the organization, but they’re also the biggest risk to the very data t...