期刊论文详细信息
Bezopasnostʹ Informacionnyh Tehnologij
Monitoring and Auditing Residual Information on the User’s Computer
Vladlena Sergeevna Oladk1 
[1]Volgograd State University
关键词: residual information;    monitoring;    audit;    risk;    information leaks;   
DOI  :  
来源: DOAJ
【 摘 要 】
This paper considers the problem of violation of information security components such as confidentiality and availability in the event of a computer user's residual information. Analyze the requirements of regulators and mechanisms to be applied in the organization to monitor the residual information or its destruction.Approach to monitoring and auditing residual information on the user's computer, which allows monitoring the residual information in certain areas proposed. Approach allows us to identify the detected information and rank it according to the degree of criticality, as well as calculate the risk of leakage and its potential to develop recommendations aimed at its reduction. The proposed approach is formally described and automated in a software system.
【 授权许可】

Unknown   

  文献评价指标  
  下载次数:0次 浏览次数:0次