2015 12th International Conference on Information Technology - New Generations 2015
DOI: 10.1109/itng.2015.147
|View full text |Cite
|
Sign up to set email alerts
|

Implementation of Security Systems for Prevention of Loss of Information at Organizations of Higher Education

Abstract: Abstract-In this paper we discuss our experience of implementation of Data Loss Prevention (DLP) system at our University. The DLP system helps to analyze, control, monitor, block and protect data at the University. With the help of the DLP system and encryption we are able to protect and control the confidential data about our clients, HR data, intellectual ownership data, legal and financial documentation, official letter exchanges with partners and clients, academic and research data, etc...

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
0
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 2 publications
0
0
0
Order By: Relevance
“…Cybersecurity risks are associated with the probability of threats that exploit an organisation's assets or its subset (Chee & Sin 2020). In recent years, information systems have become more susceptible to unintended operator errors and natural and artificial disasters because of computer connectivity and the ease with which many people can access cybersecurity systems (Boltz 1999;Talet et al 2014). Accepting risks and associated assets without protection or control, avoiding risks through risk-mitigation strategies and transferring risks to third parties are all viable risk-control strategies.…”
Section: Cybersecuritymentioning
confidence: 99%
See 2 more Smart Citations
“…Cybersecurity risks are associated with the probability of threats that exploit an organisation's assets or its subset (Chee & Sin 2020). In recent years, information systems have become more susceptible to unintended operator errors and natural and artificial disasters because of computer connectivity and the ease with which many people can access cybersecurity systems (Boltz 1999;Talet et al 2014). Accepting risks and associated assets without protection or control, avoiding risks through risk-mitigation strategies and transferring risks to third parties are all viable risk-control strategies.…”
Section: Cybersecuritymentioning
confidence: 99%
“…As part of contemporary governance settings, higher education institutions must implement a corporate strategy for managing cybersecurity, including a process model for security systems and developing a security management model for e-learning systems (Bandara et al 2014). However, a good cybersecurity technology necessitates operational management methods that enable an effective e-business environment (Boltz 1999;Talet et al 2014). Finally, a comprehensive security programme at higher education institutions emphasising risk reduction may minimise exposure.…”
Section: Cybersecurity Managementmentioning
confidence: 99%
See 1 more Smart Citation