Design and implementation of cluster monitoring on information security audit system

Author(s):  
Zuozhi Shao ◽  
Geng Zeng ◽  
Rui Gong ◽  
Yunpeng Li ◽  
Kuo Zhang
2018 ◽  
Vol 245 ◽  
pp. 10007 ◽  
Author(s):  
Marina Bolsunovskaya ◽  
Svetlana Shirokova ◽  
Aleksandra Loginova ◽  
Mikhail Uspenskij

The aim of the work is to develop a procedure for conducting an information security audit of the software system for predicting data storage failures in order to identify existing threats to information security, evaluate information security tools, and improve the efficiency of existing information security tools and introduce new ones. It is necessary to monitor the current situation to ensure information security in organizations where data storage systems are used. For this purpose, an audit system has been developed, including both organizational measures and software and hardware parts.


2020 ◽  
Vol 7 (1) ◽  
pp. 57-62
Author(s):  
Vladislav A. Voevodin ◽  
◽  
Maria S. Markina ◽  
Pavel V. Markin ◽  
◽  
...  

Sign in / Sign up

Export Citation Format

Share Document