Rodionov A.S., Belyanin V.I., Gorbunov A.A. Improving the Methods for Protecting Information from Unauthorized Access

IMPROVING THE METHODS FOR PROTECTING INFORMATION

FROM UNAUTHORIZED ACCESS

Aleksandr S. Rodionov

Candidate of Sciences (Engineering),

Associate Professor, Department of Information Security,

South-Russian State Polytechnic University named after M.I. Platov

RAS001m @mail.ru

Prosveshcheniya St., 132, 346428 Novocherkassk, Russian Federation

Vladislav I. Belyanin

Master Student, Department of Information Security,

South-Russian State Polytechnic University named after M.I. Platov

This email address is being protected from spambots. You need JavaScript enabled to view it.

Prosveshcheniya St., 132, 346428 Novocherkassk, Russian Federation

Aleksandr A. Gorbunov

Master Student, Department of Information Security,

South-Russian State Polytechnic University named after M.I. Platov

kent1157@bk. ru

Prosveshcheniya St., 132, 346428 Novocherkassk, Russian Federation

Abstract. The research relevance is conditioned by the constantly growing technical capabilities for unauthorized access to protected information in the local area networks (LAN), the development of methods of attacks, and therefore, the need to improve methods of information protection. The paper describes the peculiarities of using the system of collecting and correlating information security events SIEM (Security Information and Event Management), which detects and notifies about the emergence of threats to leakage of protected information. In the modern world, due to the ever-growing technical capabilities of attackers for unauthorized access to LAN, improving the ways of carrying out attacks on them, there is a need to improve the existing methods of information protection and to develop new ones. In addition to the technical component, an important risk factor is the human factor, due to which up to 52 % of information leaks (intentional and unintended) occur around the world. They are distributed by categories of information: 62.3 % – personal data, 31.0 % – payment documents, 3.9 % – state secrets, 2.8 % – trade secrets.

Key words: data protection, unauthorized access, software protection, SIEM system, efficiency of information protection.

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

Attachments:
Download this file (6_Rodionov i dr.pdf) 6_Rodionov i dr.pdf
URL: https://ti.jvolsu.com/index.php/en/component/attachments/download/588
558 DownloadsUpdate this file (6_Rodionov i dr.pdf)