monitoring and auditing residual information on the user’s computer

Clicks: 161
ID: 160343
2015
This paper considers the problem of violation of information security components such as confidentiality and availability in the event of a computer user's residual information. Analyze the requirements of regulators and mechanisms to be applied in the organization to monitor the residual information or its destruction.Approach to monitoring and auditing residual information on the user's computer, which allows monitoring the residual information in certain areas proposed. Approach allows us to identify the detected information and rank it according to the degree of criticality, as well as calculate the risk of leakage and its potential to develop recommendations aimed at its reduction. The proposed approach is formally described and automated in a software system.
Reference Key
oladk2015bezopasnostmonitoring Use this key to autocite in the manuscript while using SciMatic Manuscript Manager or Thesis Manager
Authors ;Vladlena Sergeevna Oladk
Journal European journal of pharmacology
Year 2015
DOI DOI not found
URL
Keywords

Citations

No citations found. To add a citation, contact the admin at info@scimatic.org

No comments yet. Be the first to comment on this article.