371.50K

Automate detection of current security threats

1.

Automate detection of current
security threats
Igor Vekshenkov

2.

The first step towards protecting information constituting confidential
information is to identify current threats to information security by building a
threat
model.
Without knowledge of the actual security threats, it is impossible to build an
adequate (from the point of view of monetary costs) information security
system that ensures the security of confidential information, since only
information security tools that neutralize current threats are included in the
security system.
2

3.

Given the increasing number of leaks of confidential information, the
identification of current threats to the security of personal data when they
are processed in personal data information systems is one of the main tasks
of an information security specialist, and automation of this process will
significantly accelerate the construction of a competent security system.
3

4.

A Content
Stage 4
Stage 5
4
English     Русский Rules