Abstract

Solving the problem of ensuring the protection of confidential information when negotiating in an office space is important. It is proposed to implement a unified systematic approach to assessing the security of information based on the measurements and the formation of control actions on the elements of the information security system. A methodology has been developed for constructing a research complex for monitoring the security characteristics of corporate information, which provided the creation of software and hardware complex "Means of protecting information from leakage through technical channels." A mockup of this hardware and software complex has been assembled, special software has been developed that allows to study the process of information leakage through technical channels and to optimize the characteristics of the confidential information protection system. The concept of constructing an individual trajectory for training complex operators and information security specialists is presented.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.