Algorithm to create an end-to-end system of monitoring the security of potential information leakage channels with reference to structures, engaged in handling confidential information has been proposed. The technology for constructing a model of estimating sufficiency of protection measures, including a technique to detect threats to confidential information has been offered. Technique to rank technical channels of information leakage has been presented
The problem of protection from deliberate leaks of information is one of the most difficult. Integra...
The theorem of system of indicators for an estimation of the security of information processes in th...
Abstract—Protecting sensitive information from improper disclosure is a fundamental security goal. I...
Algorithm to create an end-to-end system of monitoring the security of potential information leakage...
Objectives. In order to determine the security of a special-purpose informatisation object, it is ne...
New technologies provide much more progressive ways of working with information. Access to info...
Formulation of the problem. The completeness of the characteristics of one of the most serious threa...
The significant increase in requirements for distributed control objects’ functioning can’t be reali...
This article discusses the classification of information security threats according to their level. ...
An organization that works with any information must have a security system capable of protecting th...
Problem statement. The investigation the currently used methods for determining the sources of infor...
The object of the research is the system of information security of the state. Investigated proble...
This paper discusses the detailed requirements for an information barrier (IB) for use with verifica...
The use of noise generators for the protection and information leakage channels stray electromagneti...
The purpose of the article was to analyze technique to prevent information leakage using covert chan...
The problem of protection from deliberate leaks of information is one of the most difficult. Integra...
The theorem of system of indicators for an estimation of the security of information processes in th...
Abstract—Protecting sensitive information from improper disclosure is a fundamental security goal. I...
Algorithm to create an end-to-end system of monitoring the security of potential information leakage...
Objectives. In order to determine the security of a special-purpose informatisation object, it is ne...
New technologies provide much more progressive ways of working with information. Access to info...
Formulation of the problem. The completeness of the characteristics of one of the most serious threa...
The significant increase in requirements for distributed control objects’ functioning can’t be reali...
This article discusses the classification of information security threats according to their level. ...
An organization that works with any information must have a security system capable of protecting th...
Problem statement. The investigation the currently used methods for determining the sources of infor...
The object of the research is the system of information security of the state. Investigated proble...
This paper discusses the detailed requirements for an information barrier (IB) for use with verifica...
The use of noise generators for the protection and information leakage channels stray electromagneti...
The purpose of the article was to analyze technique to prevent information leakage using covert chan...
The problem of protection from deliberate leaks of information is one of the most difficult. Integra...
The theorem of system of indicators for an estimation of the security of information processes in th...
Abstract—Protecting sensitive information from improper disclosure is a fundamental security goal. I...