DEVELOPMENT OF A DLP MODULE TO PROTECT PERSONAL DATA IN A DISTRIBUTED AUTOMATED SYSTEM
Abstract and keywords
Abstract (English):
The importance of personal data protection in automated systems is being considered. A study is provided on the development of a software module for protecting confidential information, including personal data, in a distributed automated system. The primary goal of the study: to create is to create software that prevents leaks of confidential information. The developed software module is designed to block the leakage of confidential information through network channels and removable media using a machine learning model with centralized security administrator management. The practical significance: the use of this module in organizations includes ensuring centralized information security management, reducing the risk of confidential data leaks, and supporting the investigation of security incidents. The research can be used as a temporary measure during the period of updating and adapting the system to new realities until a full-fledged protection system is achieved.

Keywords:
personal data, information security management system, confidential information leaks, machine learning, DLP (Data Leaks Protection)
Text
Publication text (PDF): Read Download
References

1. Utechki informacii ogranichennogo dostupa v mire i Rossii, pervoe polugodie 2023 goda. Analiticheskiy otchet // Ekspertno-analiticheskiy centr InfoWatch, 2023. 17 c. URL: http://www.infowatch.ru/sites/default/files/analytics/files/utechki-informatsii-ogranichennogo-dostupa-v-mire-i-rossii-za-pervoe-polugodie-2023-goda.pdf (data obrascheniya: 01.04.2024)

2. Poletaeva N. G. Klassifikaciya sistem mashinnogo obucheniya // Vestnik Baltiyskogo federal'nogo universiteta im. I. Kanta. Seriya: Fiziko-matematicheskie i tehnicheskie nauki. 2020. № 1. S. 5–22.

3. Utechki informacii // Anti-Malware.ru. URL: http://www.anti-malware.ru/threats/leaks (data obrascheniya: 01.04.2024).

4. Obzor otechestvennyh SUBD // 1C-MSSoft.Ru. 2023. 4 dekabrya. URL: http://www.mssoft.ru/news/40506 (data obrascheniya: 09.04.2024).

5. Obuhov V. A. Kriptografiya na osnove ellipticheskih krivyh (ECC) // Potomki Al'-Fargani. 2023. T. 1, vyp. 4. S. 182–188. DOI:https://doi.org/10.5281/zenodo.10337673

6. Batyrkaev A. G., Glotina I. M. Chto takoe shifrovanie AES i kak ono rabotaet // Agrotehnologii XXI veka: strategiya razvitiya, tehnologii i innovacii: materialy Vserossiyskoy nauchno-prakticheskoy konferencii (Perm', 16–18 noyabrya 2021 goda). Perm': Prokrost', 2021. S. 254–258.

Login or Create
* Forgot password?