Abstract
The article describes the preparation process of software complex (package) consisting of secure corporate chat and DLP (Data Leak Prevention) system in the form of security monitor. Software development, project architecture, testing and other creation stage are demonstrated. The operation processes of security monitor are shown; the functionality of software package DLP–system is considered.
Highlights
At present, when most areas of people's lives, systems and industrial enterprises are computerized, the issue of ensuring the information security in such systems is actual. There are both external and internal threats, but for several decades, computer science and technologies has been developing rapidly and successfully precisely in the direction of creating antivirus systems and information protection systems from external intruders, not considering security incidents caused by internal violators to be significant
The industrial enterprises use various software and hardware systems and complexes to protect information; programs for cryptographic transformation of stored data, which protects assets and other valuable information from hacker attacks, it is difficult to exclude the influence of the human factor
The article describes the implemented software complex consisting of secure corporate chat and DLP–system in the form of security monitor; defines the functional requirements, and performs the algorithmic and the software design [15]
Summary
At present, when most areas of people's lives, systems and industrial enterprises are computerized, the issue of ensuring the information security in such systems is actual. The industrial enterprises use various software and hardware systems and complexes to protect information; programs for cryptographic transformation of stored data, which protects assets and other valuable information from hacker attacks, it is difficult to exclude the influence of the human factor. It can include unintentional mistakes of employees, operators and administrators, as well as deliberate conspiracies, transfer of information to competitors, and espionage. The problem of information protection at the industrial enterprise or another company from the internal threats becomes extremely relevant
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have