Analysis of threats to personal data and their protect features

Authors

  • Тетяна Василівна Німченко Institute of Information-Diagnostic Systems, National Aviation University, Komarova 1, Kyiv, Ukraine, 03680, Ukraine https://orcid.org/0000-0002-7145-2915

DOI:

https://doi.org/10.15587/2312-8372.2015.41329

Keywords:

information protection, personal data, threats, information security, systems, facilities, information

Abstract

The analysis of threats to personal data and means to counter them are analyzed. The problems that must be implemented to protect personal data are considered. Shows Solutions to minimize threats to personal data are given. It is established that the perimeter of information system defended a greater extent than minimized the internal threats and external threats countermeasures implemented more widely than internal threats countermeasures. Classification of information systems is given. It is shown that only system for identifying and data leakage prevention (DLP-system) is the only solution that prevents leakage of information outside of secure information space in real time based on data filtering or trappings that accompany the process of moving data. The architectural control system for information leaking over perimeter of secure information system is presented. It is shown that prevention of unauthorized leakage of personal data by networking channels requires the introduction of special systems of detection and blocking of this sending by network channels.

Author Biography

Тетяна Василівна Німченко, Institute of Information-Diagnostic Systems, National Aviation University, Komarova 1, Kyiv, Ukraine, 03680

Candidate of Engineering, Associate Professor

Department of Information Security Tools

References

  1. INFOBEZ-EXPO - International Exhibition and Conference. (2013). Available: http://infobez-expo.ru/
  2. Information security business. (2012). Available: http://www.kaspersky.ru/other/custom-html/brfwn/Bezopasnost_Screen.pdf
  3. Insider threats in Russia 2009. (2009). Available: http://www.perimetrix.ru/downloads/rp/PTX_Insider_Security_Threats_in_Russia_2009.pdf
  4. Korzhov, V. V. (2010). Protection of personal data: Problems and Solutions. Open systems, 10, 11.
  5. Markov, A. P., Sukhinin, B. I. (2009). Problems and solutions for the protection of personal data in the personal data information systems. Computer Security, 5, 20–27.
  6. Averchenkov, V. I., Rytov, M. Yu., Gaynulin, T. R. (2010). Formalization of the process of selection of safety equipment at the facility protection. Bulletin of computer and information technology, 11, 45–50.
  7. Nimchenko, T. V. (2015). The criterion determining the list of data those classified as personal. Bulletin of Engineering Academy of Ukraine, 1, 199–202.
  8. Sulavko, A. E. (2011). Technology to protect against internal threats to information security. Bulletin of SibADI, 1 (19), 45–51.
  9. Filonenko, S. F., Muzjik, I. M., Nimchenko, T. V. (2014). Warning leakage of personal data networking feeds. Ukrainian Scientific Jornal of Information Security, 20 (3), 279–285.
  10. Nimchenko, T. V., Muzjik, I. M., Muzjik, A. I. (2014). Algorithm for detecting unauthorized leakage of personal data networking channels. Bulletin of Engineering Academy of Ukraine, 3–4, 199–203.
  11. Gutsalyuk, M. (2004). Information Security Ukraine: new threats and organizing counter. Legal Informatics, 3, 37 –41.

Published

2015-04-02

How to Cite

Німченко, Т. В. (2015). Analysis of threats to personal data and their protect features. Technology Audit and Production Reserves, 2(5(22), 63–67. https://doi.org/10.15587/2312-8372.2015.41329