To obtain access to full text of journal and articles you must register!
- Article name
- Рrotection methods of the confidential computer information from internal threats
- Authors
- Ermoshin V. G., , nik-e@yandex.ru, Society with limited liability "Agency on return of debts",
- Keywords
- internal threats / insiders / leaking information / audit action / encryption / content filtering / strong authentication / multi-authentication
- Year
- 2009 Issue 3 Pages 53 - 57
- Code EDN
- Code DOI
- Abstract
- This article deals with the protection of computer information from the insider (internal) threats to private organizations. Author presents an analysis of modern methods of protecting computer information from internal threats and provide key stages of building a system to protect information from internal threats, not the observance of which may cause leakage of confidential information.
- Text
- To obtain access to full text of journal and articles you must register!
- Buy