Analysis of innovative methods of computer data loss prevention

А.M. Kapiton 1, doct. of ped. sciences; О.S. Dziuban 1, graduate student;
Т.M. Franchuk 2, cand. of ec. science; I.L. Yatsenko 3
1 National University «Yuri Kondratyuk Poltava Polytechnic»
  Ukraine, 36011, Poltava, Pershotravnevy prospect, 24
  tel. +38 (066) 9440001, е-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.,
  tel. +38 (050) 7669661, е-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.;
2 State University of Trade and Economics,
  Ukraine, 02156, Kiev, Kyoto Street, 19
  tel. +38 (097) 5472345, е-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.;
3 National Technical University «Kharkiv Polytechnic Institute»,
  Ukraine, 61002, Kharkiv, Kyrpychova str., 2
  tel. +38 (067) 5472345, е-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.

Èlektron. model. 2023, 45(6):77-84

https://doi.org/10.15407/emodel.45.06.077

ABSTRACT

The influence of the development of information technologies on the improvement and development of innovative methods of preventing the loss of computer data is considered. It has been proven that the development of computer network technologies is gradually accelerating, as today vulnerability is considered a potential threat to information security. The main problems of computer information leakage and computer software encryption technology to prevent computer information leakage are analyzed. Classification of the information leak has been carried out. The consequences of information leakage, which have an impact on the economic benefits of enterprises or individuals, have been studied. Data leakage prevention methods have been proposed and are currently relevant, including technical tools and product solutions such as traditional DSM (Data Encryption Management) and DSA (Data Security Isolation), as well as DLP (Data Leak Prevention) based. The protection technology to contain the leakage of computer information was analyzed. It is justified that due to the fact that electrostatic shielding is used to prevent electrostatic communication interference, it is advisable to use grounding conductors. It is determined that electromagnetic shielding uses the principle of reflection and absorption of electromagnetic waves on the surface of the conductor and inside the conductor to protect against high voltage interference.

KEYWORDS

security, data loss, shielding technologies, computer information.

REFERENCES

  1. Карачка А.Ф. Технології захисту інформації: курс лекцій. Тернопіль: ТНЕУ, 2017. 186 с.
  2. Жилін А.В., Шаповалов О.В., Успенський О.А. Технології захисту інформації в ін­фор­маційно-телекомунікаційних системах: навч. посіб. Київ: Політехніка, 2020. 214 с.
  3. Остапов С.Е., Євсеєв С.П., Король О.Г. Технологія захисту інформації: навч. посіб. Харків: ХНЕУ, 2013. 476 с.
  4. How to Prevent Data Loss in 10 Different Ways URL: https://www.vera.com/drm/prevent-data-loss/ (дата звернення: 05.08.2023).
  5. How can you prevent data loss? URL: https://www.linkedin.com/advice/3/how-can-you-prevent-data-loss-skills-security-awareness (дата звернення: 05.08.2023).
  6. How to prevent the loss of business data. URL: https://www.adobe.com/acrobat/resources/how-to-recover-from-data-loss.html (дата звернення: 05.08.2023).
  7. Steps for Preventing Data Loss URL: https://www.netcov.com/preventing-data-loss-guide/ (дата звернення: 05.08.2023).
  8. How To Protect And Prevent Computer Data Loss – Top 10 Steps URL: https://www.techbusinessnews.com.au/how-to-protect-your-computer-from-data-lose/ (дата звернен­ня: 05.08.2023).
  9. Threat Prevention solutions URL: https://nordlayer.com/threat-prevention/?gclid=EAIaIQobChMI396qireigQMVVVqRBR1ofwErEAAYAiAAEgIr8_D_BwE/ (дата звер­нення: 05.08.2023).
  10. Data Loss Prevention (DLP) URL: https://www.imperva.com/learn/data-security/data-loss-prevention-dlp/  (дата звернення: 05.08.2023).

Full text: PDF