Abstract

The article describes the preparation process of software complex (package) consisting of secure corporate chat and DLP (Data Leak Prevention) system in the form of security monitor. Software development, project architecture, testing and other creation stage are demonstrated. The operation processes of security monitor are shown; the functionality of software package DLP–system is considered.

Highlights

  • At present, when most areas of people's lives, systems and industrial enterprises are computerized, the issue of ensuring the information security in such systems is actual. There are both external and internal threats, but for several decades, computer science and technologies has been developing rapidly and successfully precisely in the direction of creating antivirus systems and information protection systems from external intruders, not considering security incidents caused by internal violators to be significant

  • The industrial enterprises use various software and hardware systems and complexes to protect information; programs for cryptographic transformation of stored data, which protects assets and other valuable information from hacker attacks, it is difficult to exclude the influence of the human factor

  • The article describes the implemented software complex consisting of secure corporate chat and DLP–system in the form of security monitor; defines the functional requirements, and performs the algorithmic and the software design [15]

Read more

Summary

Introduction

At present, when most areas of people's lives, systems and industrial enterprises are computerized, the issue of ensuring the information security in such systems is actual. The industrial enterprises use various software and hardware systems and complexes to protect information; programs for cryptographic transformation of stored data, which protects assets and other valuable information from hacker attacks, it is difficult to exclude the influence of the human factor. It can include unintentional mistakes of employees, operators and administrators, as well as deliberate conspiracies, transfer of information to competitors, and espionage. The problem of information protection at the industrial enterprise or another company from the internal threats becomes extremely relevant

Objectives
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call