
Improving the Methods for Protecting Information from Unauthorized Access
Author(s) -
A. P. Rodionov,
Vladislav Belyanin,
A. I. Gorbunov
Publication year - 2018
Publication title -
nbi tehnologii/nbi tehnologii
Language(s) - English
Resource type - Journals
eISSN - 2713-1564
pISSN - 2658-3593
DOI - 10.15688/nbit.jvolsu.2018.2.6
Subject(s) - computer security , information security , information security management , computer science , relevance (law) , information protection policy , information leakage , personally identifiable information , payment , data breach , information sensitivity , event (particle physics) , internet privacy , security information and event management , world wide web , cloud computing security , cloud computing , physics , quantum mechanics , political science , law , operating system
The research relevance is conditioned by the constantly growing technical capabilities for unauthorized access to protected information in the local area networks (LAN), the development of methods of attacks, and therefore, the need to improve methods of information protection. The paper describes the peculiarities of using the system of collecting and correlating information security events SIEM (Security Information and Event Management), which detects and notifies about the emergence of threats to leakage of protected information. In the modern world, due to the ever-growing technical capabilities of attackers for unauthorized access to LAN, improving the ways of carrying out attacks on them, there is a need to improve the existing methods of information protection and to develop new ones. In addition to the technical component, an important risk factor is the human factor, due to which up to 52 % of information leaks (intentional and unintended) occur around the world. They are distributed by categories of information: 62.3 % – personal data, 31.0 % – payment documents, 3.9 % – state secrets, 2.8 % – trade secrets.