protection information systems
The article gives consideration to the most progressive data protection systems specified against the internal threats by now.
The operational principles are described in general terms. The most vulnerable points of these systems are shown and validated. The recent trends in the evolution of the systems to protect the data from the internal threats are discussed in the article.