Use of network analysis techniques for data loss prevention (Q10660): Difference between revisions
Jump to navigation
Jump to search
(Removed claim: budget (P474): 13,199.9932 euro) |
(Changed an Item: Fixing rounding issue) |
||||||||||||||
Property / budget | |||||||||||||||
13,199.99 Euro
| |||||||||||||||
Property / budget: 13,199.99 Euro / rank | |||||||||||||||
Preferred rank | |||||||||||||||
Property / budget: 13,199.99 Euro / qualifier | |||||||||||||||
exchange rate to Euro: 0.04 Euro
| |||||||||||||||
Property / budget: 13,199.99 Euro / qualifier | |||||||||||||||
point in time: 10 January 2020
|
Revision as of 21:33, 24 September 2020
Project in Czech Republic financed by DG Regio
Language | Label | Description | Also known as |
---|---|---|---|
English | Use of network analysis techniques for data loss prevention |
Project in Czech Republic financed by DG Regio |
Statements
247,499.87 Czech koruna
0 references
329,999.83 Czech koruna
0 references
75.0 percent
0 references
28 April 2017
0 references
30 November 2017
0 references
1 December 2017
0 references
Safetica Services s.r.o.
0 references
13000
0 references
Technologie analýzy síťového toku je v dnešní době velmi rozvinutá a slouží primárně k externí bezpečnosti - odhalování malware, botnetů či útoků hackerů. Tyto postupy jsou často založeny na pokročilých statistických modelech. Postupy zaměřené na prevenci ztráty dat pracují nepracují nad záznamy o síti, ale o práci a pohybu souborů ve firmě. Cílem je ověřit, zda nelze upravit techniky síťové analýzy tak, aby odhalovany nestandardní práci s daty a identifikovali tak datová bezpečnostní rizika. a. (Czech)
0 references
The network flow analysis technologies are now highly developed and primarily serve the purpose of external security — the detection of malware, botnets or hacking. These procedures are often based on advanced statistical models. The procedures to prevent the loss of data work do not work over the network records, but the work and movement of files at the firm. The objective is to verify that network analysis techniques cannot be modified to detect non-standard work with data and identify data security risks. (English)
0 references
Identifiers
CZ.01.1.02/0.0/0.0/16_045/0009614
0 references