The motivation of investigation is explained by the problem of keeping organisations’ information and private ones secure. One reason for this is insufficiency of information protection systems, and another – vulnerability in such kind of systems. The article is devoted to defining and analyzing the types and sources of information security threats for an automated system. It can be useful for developing the model method, having the purpose of detecting and further preventing of hazards. The safeness of Data Leak Prevention (DLP) system itself is also under investigation. The analysis was carried out by an expert method with system analysis. A DLP system was considered, on the one hand, as a way of information protection to prevent informat...
This diploma thesis deals with internal threats in the organization and their restriction with the a...
<p><em>Research application of DLP-system for protection of confidential information, a methodology ...
Methods and tools of unlocking data from the local network are analyzed. Modern methods and software...
The motivation of investigation is explained by the problem of keeping organisations’ information an...
It is not uncommon these days to come across security incidents involving sensitive data. Most resea...
An organization that works with any information must have a security system capable of protecting th...
Context. Data leakage prevention (DLP), a system designed to prevent leakage and loss of secret sens...
Protection of confidential data from being leaked to the public is a growing concern among organisat...
This article discusses the classification of information security threats according to their level. ...
Sensitive and confidential data are a requisite for most companies, so protection for this data take...
Abstract- Sensitive and confidential data are a requisite for most companies, so protection for this...
In the paper the necessity of further introduction of modern systems of information protection again...
Aim. One of the key objectives of the theory and practice of information security is to analyse the ...
The disadvantages and advantages of the risk measurement methods used in the integrated protection s...
The purpose of this masters thesis is to study issues of monitoring and analysis of users using DLP ...
This diploma thesis deals with internal threats in the organization and their restriction with the a...
<p><em>Research application of DLP-system for protection of confidential information, a methodology ...
Methods and tools of unlocking data from the local network are analyzed. Modern methods and software...
The motivation of investigation is explained by the problem of keeping organisations’ information an...
It is not uncommon these days to come across security incidents involving sensitive data. Most resea...
An organization that works with any information must have a security system capable of protecting th...
Context. Data leakage prevention (DLP), a system designed to prevent leakage and loss of secret sens...
Protection of confidential data from being leaked to the public is a growing concern among organisat...
This article discusses the classification of information security threats according to their level. ...
Sensitive and confidential data are a requisite for most companies, so protection for this data take...
Abstract- Sensitive and confidential data are a requisite for most companies, so protection for this...
In the paper the necessity of further introduction of modern systems of information protection again...
Aim. One of the key objectives of the theory and practice of information security is to analyse the ...
The disadvantages and advantages of the risk measurement methods used in the integrated protection s...
The purpose of this masters thesis is to study issues of monitoring and analysis of users using DLP ...
This diploma thesis deals with internal threats in the organization and their restriction with the a...
<p><em>Research application of DLP-system for protection of confidential information, a methodology ...
Methods and tools of unlocking data from the local network are analyzed. Modern methods and software...