Monitoring and Auditing Residual Information on the User’s Computer

This paper considers the problem of violation of information security components such as confidentiality and availability in the event of a computer user's residual information. Analyze the requirements of regulators and mechanisms to be applied in the organization to monitor the residual infor...

Full description

Bibliographic Details
Main Author: Vladlena Sergeevna Oladk
Format: Article
Language:English
Published: Moscow Engineering Physics Institute 2015-06-01
Series:Bezopasnostʹ Informacionnyh Tehnologij
Subjects:
Online Access:https://bit.mephi.ru/index.php/bit/article/view/120