Have a personal or library account? Click to login
Analysis of information security threats for developing DLP-systems Cover

Analysis of information security threats for developing DLP-systems

Open Access
|Jan 2020

References

  1. Ahmad A., Bosua R., Scheepers R. 2014. Protecting organizational competitive advantage. A knowledge leakage perspective. Computers & Security, Vol. 42, 27-39. DOI: 10.1016/j.cose.2014.01.001.10.1016/j.cose.2014.01.001
  2. Alneyadi S., Sithirasenan E., Muthukkumarasamy V. 2016. A survey on data leakage prevention systems Journal of Network and Computer Applications, Vol. 62, 137-152. DOI: 10.1016/j.jnca.2016.01.008.10.1016/j.jnca.2016.01.008
  3. Boridko I. S. et al. 2013. DLP-systems: insider protection, Security of information technology, 1, 82-84, ISSN: 2074-7128eISSN: 2074-7136.
  4. Comparisonleakageprotectionsystems (DLP) 2014. Part 1, URL: https://www.antimal-ware.ru/comparisons/data_leak_protection_2014_part1.
  5. Comparisonleakageprotectionsystems (DLP) 2014. Part 2, URL: https://www.anti-malware.ru/comparisons/data_leak_protection_2014_part2
  6. ESET Press-centre 2014. URL: https://www.esetnod32.ru/company/press/center/38-sotrudnikovslivali-sekrety-eks-rabotodateley/.
  7. Gost P 51275-2006. Data protection. Information of the object. Factors affecting the information. General Provisions.
  8. Grudzień Ł., Hamrol A. 2016. Information quality in design process documentation of quality management systems. International Journal of Information Management, Vol. 36 (4), 599-606. DOI: 10.1016/j.ijinfomgt.2016.03.011.10.1016/j.ijinfomgt.2016.03.011
  9. InfoWatch Analytical Center Report Dataleakage. Russia. 2016. URL: https://www.infowatch.ru/analytics/reports/17962.
  10. Katz G., Elovici Y. Shapira B. 2014. CoBAn. A context based model for data leakage prevention. Information Sciences, Vol. 262, 137–158. DOI: 10.1016/j.ins.2013.10.005.10.1016/j.ins.2013.10.005
  11. Shamala P., Ahmad R., Zolait A., Sedek M. 2017. Integrating Information Quality dimensions into information security risk management (ISRM). Journal of Information Security and Applications, Vol. 36, 1-10. DOI: 10.1016/j.jisa.2017.07.004.10.1016/j.jisa.2017.07.004
  12. Sulavko A. Y. 2014. Technologies of protection from inner threats of information security, Bulletin of the Siberian State Automobile and Highway Academy.
  13. Xu Changbao, Zhao Yanlong, Zhang Ji-Feng, Qi Hongsheng 2017. System Identification under Information Security. IFACPapersOnLine, Vol. 50 (1), 3756–3761. DOI: 10.1016/j.ifacol.2017.08.477.10.1016/j.ifacol.2017.08.477
  14. Żywiołek J. 2016. The application of value stream mapping method for identifying basic drawbacks and reducing duration of information process in a company, Production Engineering Archives, Vol. 11, No. 2, 36-39.10.30657/pea.2016.11.09
DOI: https://doi.org/10.30657/pea.2017.17.05 | Journal eISSN: 2353-7779 | Journal ISSN: 2353-5156
Language: English
Page range: 24 - 27
Submitted on: Jul 20, 2017
Accepted on: Dec 14, 2017
Published on: Jan 28, 2020
Published by: Quality and Production Managers Association
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year

© 2020 Ekaterina Polozova, Nataliia Anashkina, published by Quality and Production Managers Association
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License.