Automate detection of current security threats

Слайд 2

The first step towards protecting information constituting confidential information is to

The first step towards protecting information constituting confidential information is to

identify current threats to information security by building a threat model. Without knowledge of the actual security threats, it is impossible to build an adequate (from the point of view of monetary costs) information security system that ensures the security of confidential information, since only information security tools that neutralize current threats are included in the security system.

2

Stage 4 (the objectives of the study and/or its main findings)

Слайд 3

Given the increasing number of leaks of confidential information, the identification

Given the increasing number of leaks of confidential information, the identification

of current threats to the security of personal data when they are processed in personal data information systems is one of the main tasks of an information security specialist, and automation of this process will significantly accelerate the construction of a competent security system.

3

Stage 5 (the positive value of the research)