Methods, models and tools for identifying, identifying and classifying threats to the information security of objects of various types and classes
Автор: Turyanskaya K.A.
Журнал: Международный журнал гуманитарных и естественных наук @intjournal
Рубрика: Технические науки
Статья в выпуске: 2-2 (89), 2024 года.
Бесплатный доступ
The increase in the number of information security incidents related to the dynamics of the emergence of modern internal and external threats of data loss or access control has made it urgent for IT users to search for and use more effective technologies to prevent and counter information security threats. Tools for monitoring and analyzing user activity play an important role in this context. The article reveals the essence and analyzes user behavior in the event of a threat to information security, in particular, to prevent data loss, access control, analysis of the behavior of internal and external users and IT facilities. Thus, this article provides an analytical review of issues related to the identification, identification and classification process, and subsequent assessment of real, perceived and potential threats to information security.
Information security, internal and external threats, information security violations, threat model, information technology
Короткий адрес: https://sciup.org/170203326
IDR: 170203326 | DOI: 10.24412/2500-1000-2024-2-2-151-155