Methods, models and tools for identifying, identifying and classifying threats to the information security of objects of various types and classes

Бесплатный доступ

The increase in the number of information security incidents related to the dynamics of the emergence of modern internal and external threats of data loss or access control has made it urgent for IT users to search for and use more effective technologies to prevent and counter information security threats. Tools for monitoring and analyzing user activity play an important role in this context. The article reveals the essence and analyzes user behavior in the event of a threat to information security, in particular, to prevent data loss, access control, analysis of the behavior of internal and external users and IT facilities. Thus, this article provides an analytical review of issues related to the identification, identification and classification process, and subsequent assessment of real, perceived and potential threats to information security.

Еще

Information security, internal and external threats, information security violations, threat model, information technology

Короткий адрес: https://sciup.org/170203326

IDR: 170203326   |   DOI: 10.24412/2500-1000-2024-2-2-151-155

Статья научная