AUDIT OF SECURITY TOOLS

FOR PERSONAL DATA INFORMATION SYSTEMS

Alexandra A. Danshina

Student, Department of Information Security,

Volgograd State University

This email address is being protected from spambots. You need JavaScript enabled to view it.

Prosp. Universitetsky, 100, 400062 Volgograd, Russian Federation

Aleksey A. Babenko

Candidate of Sciences (Pedagogy), Associate Professor, Department of Information Security,

Volgograd State University

This email address is being protected from spambots. You need JavaScript enabled to view it.

Prosp. Universitetsky, 100, 400062 Volgograd, Russian Federation

Abstract. This article proposes a model for conducting an external audit of the software and hardware parts of the organization. The statistics of the leakage of confidential information for the second quarter of 2023 are considered, as are the requirements for the information system for personal data, the levels of security of information, and the requirements for the protection of PDI. The article presents tasks implemented by the proposed model. The software package and its suggested requirements will minimize incidents in companies related to personal data leakage or unauthorized intrusions. The list of tasks for the audit program was developed on the basis of state standards. Information is a valuable resource, and its loss can affect the reputation and income of a business in various ways. That is why the problem of personal data protection has been and remains relevant. To reduce statistics on cyberattacks and identity theft, as well as to reduce the number of threats, vendors engaged in information security provide the market with more and more new solutions to ensure the protection of personal data every year. For example, security audits. Its purpose is to identify vulnerabilities, assess the effectiveness of existing information protection measures, and make recommendations to improve overall security.

Key words: audit of security tools, personal data, threat, security levels, software model.


Creative Commons License

This work is licensed under a 
Creative Commons Attribution 4.0 International License.
Attachments:
Download this file (2_Danshina, Babenko.pdf) 2_Danshina, Babenko.pdf
URL: https://ti.jvolsu.com/index.php/en/component/attachments/download/922
33 DownloadsUpdate this file (2_Danshina, Babenko.pdf)