Zhuykov E.A., Maksimova E.A. Video Capture Systems as a Means of Investigating Information Security Incidents at the Enterprise
VIDEO CAPTURE SYSTEMS AS A MEANS OF INVESTIGATING INFORMATION SECURITY INCIDENTS AT THE ENTERPRISE
Egor A. Zhuykov
Student, Department of Information Security,
Volgograd State University
This email address is being protected from spambots. You need JavaScript enabled to view it.
Prosp. Universitetsky, 100, 400062 Volgograd, Russian Federation
Elena A. Maksimova
Candidate of Sciences (Engineering), Associate Professor,
Head of Department of Information Security,
Volgograd State University
This email address is being protected from spambots. You need JavaScript enabled to view it.
Prosp. Universitetsky, 100, 400062 Volgograd, Russian Federation
Abstract. Today’s trend is the growth of information security incidents. Confirmation of this is the data of the company InfoWatch, according to which the number of leaks of confidential information in the first half of 2017 has increased by 10% as compared to the same period of 2016, and equals to 925 cases. However, 53% out of these 925 cases of diversion were sold by company employees, and 1.7% – by potential insiders. In the modern world, an insider is a very common concept. It is applicable in different spheres of economic activity. In a general sense, an insider is a natural or legal person who, due to his or her position, has access to valuable (mainly, of course, from an economic point of view) information.
Valuable information is also called insider information. The article is devoted to the consideration of video capture systems that can help prevent leakage of information from personal computers in the enterprise.
The proposed scheme of expert evaluation of video capture allows you to determine the system based on the selected criteria and specified weight coefficients, and lets the user make the best choice in the decision-making process of a specific problem.
Key words: video capture, insider, security, insider information, information security.
This work is licensed under a Creative Commons Attribution 4.0 International License.