2014, Vol.17, No.3, pp.296-300
Algorithm to create an end-to-end system of monitoring the security of potential information leakage channels with reference to structures, engaged in handling confidential information has been proposed. The technology for constructing a model of estimating sufficiency of protection measures, including a technique to detect threats to confidential information has been offered. Technique to rank technical channels of information leakage has been presented.
Full text: Acrobat PDF (314KB) Open Access
Copyright © Nonlinear Phenomena in Complex Systems. Last updated: November 25, 2014