ComputersSecurity

Basics of computer security, or the need to protect information

In the modern information age, when technological progress has reached, it would seem, unprecedented heights, the issue of information protection is acute. The basics of computer security allow you to manage this process, preventing many problems.

Why protect information? And most importantly, from what? We have to answer these questions. So, what data can be attacked and what consequences does it entail?

Today, the basics of computer security are not familiar to everyone and not everyone understands the need for their use. In addition, this issue is given very little attention, if we compare it with the volume with which we have to face every day. It would seem that nothing terrible. Well, who needs our personal data, for example? It's also a matter of protection. And remember, how many times have you heard about the "immaculate" loan. That is, a person lived quietly with his everyday life, did not suspect anything. Until one day I received a letter from a bank about the debt on the loan, which he did not even see. Here an ordinary resident for the first time and will face the problem of information leakage. Where did they come from, this information about his identity card? It remains only to guess. What to say, did not keep track.

A separate story about organizations that contain information in their archives under the "Secret" stamp. State or military secrets are carefully protected by law, but here it does not do without incidents. What is worth only the famous Internet resource, constantly analyzing the "leak" from the national control materials. Not only the dissemination of classified information, but its corruption or change brings huge problems. It should be noted that earlier, when the distribution of technical means was not so comprehensive, the basics of computer security were necessary primarily for the above-mentioned organizations.

Internal threat

Yes, various third-party tools represent a significant danger for computer systems. Such as viruses, unauthorized access to databases. However, much of the damage is done by the so-called internal threat. For example, an employee of an organization protecting a trade secret decided to use secret data for the sake of personal enrichment. Given the scale of the planned enterprise, this can bring significant benefits and, as a consequence, harm the victim of such fraud.

Protection

Legislation in this area is more developed in countries with developed computer technologies and industry. In such, where have repeatedly faced with this problem and understand what consequences this can lead to. In those where the basics of computer security - not an empty sound. And with the emergence of new types of violations develop and regulatory acts. One of the important documents was the Law on Personal Data, which came into force in 2006.

Let's sum up:

  1. In the world of modern achievements and technologies, the foundations of information and computer security are of great importance.
  2. Inadequate data protection can lead to their spreading, corrupting, changing or closing access to them for the owners themselves.
  3. Legislation in this area is not yet sufficiently developed and does not provide for all possible options.

Over time, there is a growing need for information security. More and more specialists are engaged in providing it. And how many more students of universities in the country are studying the theoretical basis of computer security. Perhaps in the near future from the problems with data protection there will be no trace.

Similar articles

 

 

 

 

Trending Now

 

 

 

 

Newest

Copyright © 2018 en.atomiyme.com. Theme powered by WordPress.