The purpose of this work is to analyze and classify threats that arise when working with personal data in information systems. In the field of information technology in any country, one of the national interests is to ensure and protect the constitutional rights and freedoms of man and citizen in so far as it relates to the receipt and use of information, as well as confidentiality when using information technologies. In this regard, special attention is currently being paid to the organization of processing and ensuring the security of personal data in information systems, including during their cross-border transfer. In the European Union, this activity is regulated by the General Data Protection Regulation (GDPR), which was put into effect on May 25, 2018. Personal data are in a high-risk area, especially in organizations that operate with large amounts of personal data, such as passport data, solvency data, employers, contact details, phone numbers, addresses, email, and other information that represents interest for potential computer attacks. The solution to the problem of ensuring the security of personal data is impossible without identifying and classifying potential threats to personal data in information systems. The proposed classification can serve as the basis for a threat model of a specific information system designed to process personal data.
In this article the structure, main components and functioning of Segment Routing (SR) are analyzed. Segment routing is a WAN traffic routing technique existing on MPLS and only-BGP networks. Segment routing is also considered as a way of improving the infrastructure performance and efficiency. The main advantages of SR are achieved through the implementation of the SDN concept approach, without changing the standard data transferring plane for each of the technologies, above which SR can be applied. The article also covers the main areas of SR technology application, interaction in a centralized and decentralized network. The article provides the examples of controllers for SDN implementation using SR. The presence of a controller in the network permits the realization of bandwidth on demand, traffic prioritize, selection of the most suitable route in the network for different types of traffic easier and more often without any protocols or devices. Another important advantage of controller’s implementation on networks using SR can be a reduction of the services recovery time after a failure, because the route will be rebuilt faster (compared to MPLS). SR can be considered as an opportunity to refuse from such protocols as LDP or RSVP for situation when used on a network in tandem with a controller. IPv6 networks, using SR, are able to acquire additional capabilities in programmability and flexibility.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.