{"title":"Complex protection of information in operating systems","authors":"O. Galochkin, D. Uhryn, A.V. Hostyuk, O. Ushenko","doi":"10.31649/1681-7893-2022-44-2-44-48","DOIUrl":null,"url":null,"abstract":"Data security is one of the main tasks solved by IT departments of companies. Moreover, it is not only about preventing the leakage of corporate information, reducing the volume of parasitic traffic and repelling attacks on the company's resources, but also about optimizing the system as a whole. \nIt is virtually impossible to find a universal solution in this matter: the heterogeneity of the spheres of activity and the structures of organizations translates the task into a category that requires an individual approach. The article deals with the main information threats of corporate systems, as well as methods of protection against common threats and attacks on information systems of the enterprise, estimated the cost of specific solutions.","PeriodicalId":142101,"journal":{"name":"Optoelectronic information-power technologies","volume":"42 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Optoelectronic information-power technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31649/1681-7893-2022-44-2-44-48","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Data security is one of the main tasks solved by IT departments of companies. Moreover, it is not only about preventing the leakage of corporate information, reducing the volume of parasitic traffic and repelling attacks on the company's resources, but also about optimizing the system as a whole.
It is virtually impossible to find a universal solution in this matter: the heterogeneity of the spheres of activity and the structures of organizations translates the task into a category that requires an individual approach. The article deals with the main information threats of corporate systems, as well as methods of protection against common threats and attacks on information systems of the enterprise, estimated the cost of specific solutions.