ЗАХИСТ ІНФОРМАЦІЙНИХ РЕСУРСІВ ВІД ВНУТРІШНІХ ЗАГРОЗ
Анотація
Protection of information resources against internal threats
Analysis of security mechanisms regarding insider attacks in modern information systems is conducted. The main tasks and functions of Information Protection and Control (IPC) technology are examined. Information security system from insider threats includes technical security mechanisms and software, psychological and organizational measures and work with staff. In order to ensure and develop comprehensive security system creating of the appropriate unit to adress internal threats, developing enterprise security policies and implementing continuous security monitoring are proposed.
Посилання
Ульянов В.В. Динамика безопасности: от внешних угроз – к внутренним / В.В.Ульянов // Защита информации. INSIDE.– 2008. - № 4. – С. 34 – 38.
Probst, C.W. Insider Threats in Cyber Security/ C.W. Probst– 2010. – 245p.
CUA-15-04R. Рекомендації CERT-UA з протидії загрозі інсайдера [Електронний ресурс] / І. Соколов - №1 – 2015
##submission.downloads##
Опубліковано
Як цитувати
Номер
Розділ
Ліцензія
Авторське право (c) 2016 Владислава Романівна Дмитрук, С. В. Толюпа
Ця робота ліцензується відповідно до Creative Commons Attribution 4.0 International License.
Authors who submit to this conference agree to the following terms:a) Authors retain copyright over their work, while allowing the conference to place this unpublished work under a Creative Commons Attribution License, which allows others to freely access, use, and share the work, with an acknowledgement of the work's authorship and its initial presentation at this conference.
b) Authors are able to waive the terms of the CC license and enter into separate, additional contractual arrangements for the non-exclusive distribution and subsequent publication of this work (e.g., publish a revised version in a journal, post it to an institutional repository or publish it in a book), with an acknowledgement of its initial presentation at this conference.
c) In addition, authors are encouraged to post and share their work online (e.g., in institutional repositories or on their website) at any point before and after the conference.