Analysis of threats to personal data and their protect features
DOI:
https://doi.org/10.15587/2312-8372.2015.41329Keywords:
information protection, personal data, threats, information security, systems, facilities, informationAbstract
The analysis of threats to personal data and means to counter them are analyzed. The problems that must be implemented to protect personal data are considered. Shows Solutions to minimize threats to personal data are given. It is established that the perimeter of information system defended a greater extent than minimized the internal threats and external threats countermeasures implemented more widely than internal threats countermeasures. Classification of information systems is given. It is shown that only system for identifying and data leakage prevention (DLP-system) is the only solution that prevents leakage of information outside of secure information space in real time based on data filtering or trappings that accompany the process of moving data. The architectural control system for information leaking over perimeter of secure information system is presented. It is shown that prevention of unauthorized leakage of personal data by networking channels requires the introduction of special systems of detection and blocking of this sending by network channels.
References
- INFOBEZ-EXPO - International Exhibition and Conference. (2013). Available: http://infobez-expo.ru/
- Information security business. (2012). Available: http://www.kaspersky.ru/other/custom-html/brfwn/Bezopasnost_Screen.pdf
- Insider threats in Russia 2009. (2009). Available: http://www.perimetrix.ru/downloads/rp/PTX_Insider_Security_Threats_in_Russia_2009.pdf
- Korzhov, V. V. (2010). Protection of personal data: Problems and Solutions. Open systems, 10, 11.
- Markov, A. P., Sukhinin, B. I. (2009). Problems and solutions for the protection of personal data in the personal data information systems. Computer Security, 5, 20–27.
- Averchenkov, V. I., Rytov, M. Yu., Gaynulin, T. R. (2010). Formalization of the process of selection of safety equipment at the facility protection. Bulletin of computer and information technology, 11, 45–50.
- Nimchenko, T. V. (2015). The criterion determining the list of data those classified as personal. Bulletin of Engineering Academy of Ukraine, 1, 199–202.
- Sulavko, A. E. (2011). Technology to protect against internal threats to information security. Bulletin of SibADI, 1 (19), 45–51.
- Filonenko, S. F., Muzjik, I. M., Nimchenko, T. V. (2014). Warning leakage of personal data networking feeds. Ukrainian Scientific Jornal of Information Security, 20 (3), 279–285.
- Nimchenko, T. V., Muzjik, I. M., Muzjik, A. I. (2014). Algorithm for detecting unauthorized leakage of personal data networking channels. Bulletin of Engineering Academy of Ukraine, 3–4, 199–203.
- Gutsalyuk, M. (2004). Information Security Ukraine: new threats and organizing counter. Legal Informatics, 3, 37 –41.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2016 Тетяна Василівна Німченко
This work is licensed under a Creative Commons Attribution 4.0 International License.
The consolidation and conditions for the transfer of copyright (identification of authorship) is carried out in the License Agreement. In particular, the authors reserve the right to the authorship of their manuscript and transfer the first publication of this work to the journal under the terms of the Creative Commons CC BY license. At the same time, they have the right to conclude on their own additional agreements concerning the non-exclusive distribution of the work in the form in which it was published by this journal, but provided that the link to the first publication of the article in this journal is preserved.