The purpose of this masters thesis is to study issues of monitoring and analysis of users using DLP (Data Loss Prevention) system, the definition of internal and external attacks, the description of the main parts of the DLP system, managing of politic, monitoring user activities and classifying the data content. This paper explains the difference between contextual and content analysis and describes their techniques. It shows the fundamentals of network and endpoint monitoring and describes the process and users activities which may cause a data leakage. Lastly, we have developed endpoint protection agent who serves to the monitoring activities at a terminal station
In today’s business world, many organizations use Information Systems to manage their sensitive and ...
It is not uncommon these days to come across security incidents involving sensitive data. Most resea...
Ensuring continuity of the institutional structure of the data can be made by protecting data. Provi...
The purpose of this work is presenting Data Loss Prevention systems, describing each element of it a...
This work presents an analysis of the algorithm for detecting anomalous situations in the behavior o...
The motivation of investigation is explained by the problem of keeping organisations’ information an...
The motivation of investigation is explained by the problem of keeping organisations’ information an...
Context. Data leakage prevention (DLP), a system designed to prevent leakage and loss of secret sens...
DLP systems are designed to identify and prevent unwanted data leakage. Often, systematic blocking i...
Methods and tools of unlocking data from the local network are analyzed. Modern methods and software...
The aim of this thesis is to provide basic information from the field of the data loss prevention. I...
The bachelor thesis deals with elaboration of data protection proposal using Data Loss Prevention te...
Protection of confidential data from being leaked to the public is a growing concern among organisat...
Sensitive and confidential data are a requisite for most companies, so protection for this data take...
Abstract- Sensitive and confidential data are a requisite for most companies, so protection for this...
In today’s business world, many organizations use Information Systems to manage their sensitive and ...
It is not uncommon these days to come across security incidents involving sensitive data. Most resea...
Ensuring continuity of the institutional structure of the data can be made by protecting data. Provi...
The purpose of this work is presenting Data Loss Prevention systems, describing each element of it a...
This work presents an analysis of the algorithm for detecting anomalous situations in the behavior o...
The motivation of investigation is explained by the problem of keeping organisations’ information an...
The motivation of investigation is explained by the problem of keeping organisations’ information an...
Context. Data leakage prevention (DLP), a system designed to prevent leakage and loss of secret sens...
DLP systems are designed to identify and prevent unwanted data leakage. Often, systematic blocking i...
Methods and tools of unlocking data from the local network are analyzed. Modern methods and software...
The aim of this thesis is to provide basic information from the field of the data loss prevention. I...
The bachelor thesis deals with elaboration of data protection proposal using Data Loss Prevention te...
Protection of confidential data from being leaked to the public is a growing concern among organisat...
Sensitive and confidential data are a requisite for most companies, so protection for this data take...
Abstract- Sensitive and confidential data are a requisite for most companies, so protection for this...
In today’s business world, many organizations use Information Systems to manage their sensitive and ...
It is not uncommon these days to come across security incidents involving sensitive data. Most resea...
Ensuring continuity of the institutional structure of the data can be made by protecting data. Provi...