Preview

USING THE ADAPTED DLP SYSTEM FOR BLOCKING INFORMATION LEAKS

https://doi.org/10.21122/2309-4923-2017-4-52-57

Abstract

The importance of using the adapted DLP-system in the «Blocking» mode of leaking confidential information of the company is investigated. The scheme of interception of information security events in the «Copy» mode is given, the analysis of which reflects the main drawback of using this mode – the DLP-system works only with copies of confidential documents, while the originals were delivered to the recipient. Such cases inflict enormous damage on companies, so the transfer of critical information beyond the corporate network is unacceptable.

A solution is proposed for transferring the operation of the DLP-system from the «Copy» mode to the «Blocking» mode. It is important that the operation of the DLP-system does not hinder the staff members from performing regular operations and does not hinder business processes. Therefore, it is mandatory to adapt the standard DLP-system to the specifics of the company’s activities. After that the transition of the adapted DLP-system to the «Blocking» mode is carried out.

Developed: the transition procedure of the adapted DLP-system from the «Copy» mode to the «Blocking» mode, the scheme of the event capture by the DLP-system for the two modes. The main channels of data leaks were investigated, the main leaks were identified by the data type and by the transmission channel. The analysis of the DLP-system operation in the «Blocking» mode is performed.

About the Authors

T. A. Andryianava
Belarusian State University of Informatics and Radioelectronics
Belarus
Postgraduate student


S. B. Salomatin
Belarusian State University of Informatics and Radioelectronics
Belarus
Ph. D., associate professor


References

1. Andrijanova, T. A. DLP: snizhenie riska utechki konfi informacii Banka / T. A. Andrijanova, S. B. Salomatin // Sistemnyj analiz i prikladnaja informatika. – 2017. -№ 3.

2. Analiticheskij centr kompanii InfoWatch / InfoWatch [Jelektronnyj resurs]. – 2017. – Rezhim dostupa: https://www.infowatch.ru/analytics. – Data dostupa: 04.09.2017.

3. Analiticheskij centr kompanii Zecurion Analytics / Zecurion [Jelektronnyj resurs]. – 2017. – Rezhim dostupa: http://www.zecurion-ru/press/analytics/. – Data dostupa: 30.08.2017.

4. Tehnicheskaja baza znanij kompanii InfoWatch / InfoWatch [Jelektronnyj resurs]. – 2017. – Rezhim dostupa: https://kb.infowatch.com/#all-updates. – Data dostupa: 11.08.2017.

5. Petrakov, A. B. Osnovy prakticheskoj zashhity informacii. / A. B. Petrakov //: ucheb. posobie. – M.: 2005. – 281 c.

6. Zegzhda, D. P. Osnovy bezopasnosti informacionnyh sistem / Zegzhda, D. P., Ivashko, A. M. // M.: Gorjachaja linija – Telekom, 2000. – 452 s.

7. Meljuk, A. A. Vvedenie v zashhitu informacii v avtomatizirovannyh sistemah / A. A. Meljuk, S. V. Pazizin, N. Pogozhin // M.: Gorjachaja linija – Telekom, 2001. – 48 s.

8. Bataronov, I. L. Ocenka i regulirovanie riskov, obnaruzhenie i preduprezhdenie komp’juternyh atak na innovacionnye proekty / I. L. Bataronov, A. V. Parinov, K. V. Simonov // Informacija i bezopasnost’. – 2013. – T. 16. – Vyp. 2. – S. 243–246 c.

9. Butuzov, V. V. K voprosu obosnovanija funkcii ushherba atakuemyh sistem / V. V. Butuzov, A. V. Zarjaev // Informacija i bezopasnost’. – 2013. – T. 16. – Vyp. 1. – S. 47–54.


Review

For citations:


Andryianava T.A., Salomatin S.B. USING THE ADAPTED DLP SYSTEM FOR BLOCKING INFORMATION LEAKS. «System analysis and applied information science». 2017;(4):52-57. (In Russ.) https://doi.org/10.21122/2309-4923-2017-4-52-57

Views: 1967


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 2309-4923 (Print)
ISSN 2414-0481 (Online)