Open Access

Analysis of information security threats for developing DLP-systems


Cite

Ahmad A., Bosua R., Scheepers R. 2014. Protecting organizational competitive advantage. A knowledge leakage perspective. Computers & Security, Vol. 42, 27-39. DOI: 10.1016/j.cose.2014.01.001.10.1016/j.cose.2014.01.001Open DOISearch in Google Scholar

Alneyadi S., Sithirasenan E., Muthukkumarasamy V. 2016. A survey on data leakage prevention systems Journal of Network and Computer Applications, Vol. 62, 137-152. DOI: 10.1016/j.jnca.2016.01.008.10.1016/j.jnca.2016.01.008Open DOISearch in Google Scholar

Boridko I. S. et al. 2013. DLP-systems: insider protection, Security of information technology, 1, 82-84, ISSN: 2074-7128eISSN: 2074-7136.Search in Google Scholar

Comparisonleakageprotectionsystems (DLP) 2014. Part 1, URL: https://www.antimal-ware.ru/comparisons/data_leak_protection_2014_part1.Search in Google Scholar

Comparisonleakageprotectionsystems (DLP) 2014. Part 2, URL: https://www.anti-malware.ru/comparisons/data_leak_protection_2014_part2Search in Google Scholar

ESET Press-centre 2014. URL: https://www.esetnod32.ru/company/press/center/38-sotrudnikovslivali-sekrety-eks-rabotodateley/.Search in Google Scholar

Gost P 51275-2006. Data protection. Information of the object. Factors affecting the information. General Provisions.Search in Google Scholar

Grudzień Ł., Hamrol A. 2016. Information quality in design process documentation of quality management systems. International Journal of Information Management, Vol. 36 (4), 599-606. DOI: 10.1016/j.ijinfomgt.2016.03.011.10.1016/j.ijinfomgt.2016.03.011Open DOISearch in Google Scholar

InfoWatch Analytical Center Report Dataleakage. Russia. 2016. URL: https://www.infowatch.ru/analytics/reports/17962.Search in Google Scholar

Katz G., Elovici Y. Shapira B. 2014. CoBAn. A context based model for data leakage prevention. Information Sciences, Vol. 262, 137–158. DOI: 10.1016/j.ins.2013.10.005.10.1016/j.ins.2013.10.005Open DOISearch in Google Scholar

Shamala P., Ahmad R., Zolait A., Sedek M. 2017. Integrating Information Quality dimensions into information security risk management (ISRM). Journal of Information Security and Applications, Vol. 36, 1-10. DOI: 10.1016/j.jisa.2017.07.004.10.1016/j.jisa.2017.07.004Open DOISearch in Google Scholar

Sulavko A. Y. 2014. Technologies of protection from inner threats of information security, Bulletin of the Siberian State Automobile and Highway Academy.Search in Google Scholar

Xu Changbao, Zhao Yanlong, Zhang Ji-Feng, Qi Hongsheng 2017. System Identification under Information Security. IFACPapersOnLine, Vol. 50 (1), 3756–3761. DOI: 10.1016/j.ifacol.2017.08.477.10.1016/j.ifacol.2017.08.477Open DOISearch in Google Scholar

Żywiołek J. 2016. The application of value stream mapping method for identifying basic drawbacks and reducing duration of information process in a company, Production Engineering Archives, Vol. 11, No. 2, 36-39.10.30657/pea.2016.11.09Open DOISearch in Google Scholar