А.M. Kapiton 1, doct. of ped. sciences; О.S. Dziuban 1, graduate student;
Т.M. Franchuk 2, cand. of ec. science; I.L. Yatsenko 3
1 National University «Yuri Kondratyuk Poltava Polytechnic»
Ukraine, 36011, Poltava, Pershotravnevy prospect, 24
tel. +38 (066) 9440001, е-mail:
tel. +38 (050) 7669661, е-mail:
2 State University of Trade and Economics,
Ukraine, 02156, Kiev, Kyoto Street, 19
tel. +38 (097) 5472345, е-mail:
3 National Technical University «Kharkiv Polytechnic Institute»,
Ukraine, 61002, Kharkiv, Kyrpychova str., 2
tel. +38 (067) 5472345, е-mail:
Èlektron. model. 2023, 45(6):77-84
https://doi.org/10.15407/emodel.45.06.077
ABSTRACT
The influence of the development of information technologies on the improvement and development of innovative methods of preventing the loss of computer data is considered. It has been proven that the development of computer network technologies is gradually accelerating, as today vulnerability is considered a potential threat to information security. The main problems of computer information leakage and computer software encryption technology to prevent computer information leakage are analyzed. Classification of the information leak has been carried out. The consequences of information leakage, which have an impact on the economic benefits of enterprises or individuals, have been studied. Data leakage prevention methods have been proposed and are currently relevant, including technical tools and product solutions such as traditional DSM (Data Encryption Management) and DSA (Data Security Isolation), as well as DLP (Data Leak Prevention) based. The protection technology to contain the leakage of computer information was analyzed. It is justified that due to the fact that electrostatic shielding is used to prevent electrostatic communication interference, it is advisable to use grounding conductors. It is determined that electromagnetic shielding uses the principle of reflection and absorption of electromagnetic waves on the surface of the conductor and inside the conductor to protect against high voltage interference.
KEYWORDS
security, data loss, shielding technologies, computer information.
REFERENCES
- Карачка А.Ф. Технології захисту інформації: курс лекцій. Тернопіль: ТНЕУ, 2017. 186 с.
- Жилін А.В., Шаповалов О.В., Успенський О.А. Технології захисту інформації в інформаційно-телекомунікаційних системах: навч. посіб. Київ: Політехніка, 2020. 214 с.
- Остапов С.Е., Євсеєв С.П., Король О.Г. Технологія захисту інформації: навч. посіб. Харків: ХНЕУ, 2013. 476 с.
- How to Prevent Data Loss in 10 Different Ways URL: https://www.vera.com/drm/prevent-data-loss/ (дата звернення: 05.08.2023).
- How can you prevent data loss? URL: https://www.linkedin.com/advice/3/how-can-you-prevent-data-loss-skills-security-awareness (дата звернення: 05.08.2023).
- How to prevent the loss of business data. URL: https://www.adobe.com/acrobat/resources/how-to-recover-from-data-loss.html (дата звернення: 05.08.2023).
- Steps for Preventing Data Loss URL: https://www.netcov.com/preventing-data-loss-guide/ (дата звернення: 05.08.2023).
- How To Protect And Prevent Computer Data Loss – Top 10 Steps URL: https://www.techbusinessnews.com.au/how-to-protect-your-computer-from-data-lose/ (дата звернення: 05.08.2023).
- Threat Prevention solutions URL: https://nordlayer.com/threat-prevention/?gclid=EAIaIQobChMI396qireigQMVVVqRBR1ofwErEAAYAiAAEgIr8_D_BwE/ (дата звернення: 05.08.2023).
- Data Loss Prevention (DLP) URL: https://www.imperva.com/learn/data-security/data-loss-prevention-dlp/ (дата звернення: 05.08.2023).