РУС ENG

ANALYSIS OF METHODS AND MEANS OF PREVENTING CONFIDENTIAL DATA LEAKS

About

News
Aims and Scope
Founder and Publisher
Editorial board
Licensing terms
Privacy Statement
Plagiarism policy
Publication ethics
Archiving Policy
Subscription


For Authors

Instructions for authors
Reviewing proccess
Copyright Notice
License agreement
Article processing charges


Archive

All issues
Search


Contacts

Contacts


N.E. Gubenko
Federal State Budgetary Educational Institution of Higher Education "Donetsk National Technical University", Donetsk
Research interests: computer information technology, computer security, modern educational technologies

Y.Y. Potreba
Federal State Budgetary Educational Institution of Higher Education "Donetsk National Technical University", Donetsk
Research interests: computer information technology and design, computer security

UDC 004.056.5
DOI 10.34757/2413-7383.2023.30.3.005
Language:Russian

Annotation: The article analyzes methods and means of protecting confidential information. The search for the most effective approaches to ensure the security of confidential data has been carried out. The advantages and disadvantages of the selected approaches are described. The functions of the data leak prevention system are classified.

Keywords: information security, confidentiality, data leakage.

References:
1. DLP systems are an element of information security [Electronic resource]. Access mode: https://www.azone-it.ru/dlp-sistemy-vazhnaya-sostavlyayushchaya-informacionnoy-bezopasnostipredpriyatiya
2. Fundamentals of information security [Electronic resource]. Access mode: https://цбис.рф/osnovyinformatsionnoj-bezopasnosti
3. Prevention of data leaks [Electronic resource]. Access mode: http://allta.com.ua/nashiresheniya/informacionnaya-bezopasnost/dlp-systems
4. EDR — detection and response to endpoint threats [Electronic resource]. Access mode: https://cloudnetworks.ru/inf-bezopasnost/edr/
5. Brokers of secure cloud access (CASB) [Electronic resource]. Access mode: https://www.antimalware.ru/security/casb
6. Behavioral Analysis Systems – User and Entity Behavioral Analytics (UEBA) [Electronic resource]. Access mode: https://cisoclub.ru/sistemy-povedencheskogo-analiza-user-and-entity-behavioral-analyticsueba/
7. Security Information and Event Management (SIEM) [Electronic resource]. Access mode: https://www.tadviser.ru/index.php/ Статья:Security_Information_and_Event_Management_(SIEM)
8. Prevention of information leaks using DLP systems [Electronic resource]. Access mode: https://vc.ru/u/1193668-fenixhost/453548-predotvrashchenie-utechek-informacii-s-pomoshchyu-dlpsistem
9. Information security. Data protection using a DLP system [Electronic resource]. Access mode: https://searchinform.ru/informatsionnaya-bezopasnost/dlp-sistemy
10.Introduction of a DLP system at the enterprise [Electronic resource]. Access mode: https://spravochnick.ru/informatika/vnedrenie_dlp-sistemy_na_predpriyatii
11. DLP — protection against information leaks [Electronic resource]. Access mode: https://cloudnetworks.ru/inf-bezopasnost/dlp/
12. Kot E. M. The influence of digital technologies on economic and social aspects / E. M. Kot, I. F. Pilnikova, A. A. Krokhalev, L. N. Pilnikov, R. M. Ismatulayeva. Education and Law. 2023. No. 6. pp. 238-241.
13.Rumyantsev V. V. On the role of information technologies in the development of civilization / V. V. Rumyantsev. Problems of artificial intelligence. 2021. № 4 (23). Pp. 59-64.
14. Strakhov A. A. On data leakage and DLP systems / A. A. Strakhov, N. M. Dubinina. Criminological Journal. 2022. No. 4. pp. 226-232.
15. Dmitryuk T. G. Analysis of the structure of the production activity of an enterprise as an object of management / T. G. Dmitryuk, S. A. Zori. Problems of artificial intelligence. 2020. № 1 (16). Pp. 37-53.
16. Ausilova N. M. Application of DLP systems as a tool for ensuring information security / N. M. Ausilova, A. B. Zarynbekov, G. B. Akhmet. Science and Reality. 2023. № 1 (13). Pp. 93-96.
17. Dorokhina G. V. Requirements for information technology of digital data collection, processing and analysis / G. V. Dorokhina. Problems of artificial intelligence. 2020. № 4 (19). Pp. 4-9.
18. Larionova S. L. The method of decision-making under uncertainty to ensure information security / S. L. Larionova, L. I. Tovpeko. Innovation and investment. 2020. pp. 114-118.
19. Antsyferov S. S. Technological foundations of building intelligent systems / S. S. Antsyferov, A. S. Sigov. Problems of artificial intelligence. 2016. № 1 (2). Pp. 34-44.
20. Mityushin D. A. Legal issues of application of protection systems against leakage of confidential information at informatization facilities / D. A. Mityushin. Bulletin of the Moscow University of the Ministry of Internal Affairs of Russia. 2020. No. 5. pp. 163-168.
21.Rumyantsev V. V. Hierarchy of intelligent systems / V. V. Rumyantsev. Problems of artificial intelligence. 2018. № 1 (8). Pp. 23-31.
22.Chub V. S. The study of the implementation of the use of shorthand methods in the DLP system / V. S. Chub, V. V. Galushka. Young researcher Don - 2019.
23. Durandina A. P. Economic and organizational aspects of the use of anti-data leakage systems / A. P. Durandina. St. Petersburg Economic Journal. 2021. No. 1. pp. 132-138.

Issues: 3(30)'2023
Section: Informatics, Computer Engineering and Control
Cite: Potreba, Y.Y. ANALYSIS OF METHODS AND MEANS OF PREVENTING CONFIDENTIAL DATA LEAKS // Y.Y. Potreba, N.E. Gubenko // Проблемы искусственного интеллекта. - 2023. № 3 (30). - http://search.rads-doi.org/project/13749/object/201187 doi: 10.34757/2413-7383.2023.30.3.005