6. Conclusion
The current strategy of information systems protection is should be partially reviewed. According to the fact that for a long time, this problem was solved only with the tolls of access control, so completely protect the IS from insiders it was not possible. It connects to the fact that the functionality of these tools do not allow to protect the IS from the internal network attacks, as well as the actions of internal users of IS, which is not directly related to the violation of the access rules restricting to the information resources of IS.
To protect information security from internal threats it is need to use ISD and active monitoring system. The sensors of ISD are installed at servers of the intrusion detection system and IS workstation and perform the functions of detection the network attacks by analyzing network traffic. The sensors of active monitoring system are installed on users workstations of IS and allow to detect and block the actions of users who violate the specified policy. The sharing use of intrusion detection systems and active monitoring systems allow to use a comprehensive approach in the protection against internal attacks and significantly improve the level of information security in IS.