ComputersInformation Technology

Methods of information protection

The sphere of information plays an increasing role in supporting the safety of all objects of society's life, which explains the fact that protection from information leakage is considered to be the most important direction of the state's activity.

Fundamentals of Information Security

All existing information is presented in various forms and on different physical media:

• documentary form;

• acoustic or speech form;

• telecommunications, etc.

The information is documented in alphanumeric and graphical form on paper, as well as on magnetic media. Its peculiarity is the content of information that is subject to protection, in a condensed form.

Speech information is born in the course of negotiating in the premises, as well as when operating a sound reinforcement system or sound reproduction.

Carriers of this form are acoustic vibrations, which are mechanical and propagate from the source to the outer space.

The circulation of telecommunications information takes place in the technical means of storing and processing data during their transmission through communication channels. The information carrier in this case is an electric current, and if it is transmitted through a radio channel and an optical channel, then electromagnetic waves.

Methods of information protection depending on the object

Main objects:

• information resources that contain information relating to confidential data and state secrets ;

• information systems and facilities (information and computer systems, systems and networks), software (DBMS, operating systems, other types of system-wide and applied software), automated control systems, communication systems. That is, these are the systems and tools that directly handle "private" information. Such means and systems are considered technical means of receiving, processing, storing and transmitting data or information (TSPI);

• technical systems and facilities that do not relate to information systems and facilities (TSPI), but are located in the premises where sensitive and sensitive information is processed. These technical systems and means are called auxiliary technical systems and means (VTSS).

Common methods of information protection:

1) an obstacle is a method of physically limiting the path to protected information (media, equipment, etc.);

2) the method of access control is the protection of information resources by controlling the use of each of them. These include the elements of databases, software and hardware.

Information security methods that restrict access:

- identification of users, computer system resources, personnel (assignment of personal identifier to objects);

- the method of identification (authenticity) of an object or subject according to the login identifier specified by it;

- control of authority, i.e. Analysis of the correspondence of the day, time of day, requested procedures and resources in accordance with the established regulations;

- Establishment of regulations for the resolution of the working time range;

- registration of each appeal to the protected resources;

- Restriction reaction when attempting unauthorized access (alarm activation, disabling, denial of request);

3) masking is the protection of information by means of its cryptographic closure. This is the only reliable method for transferring data over long channels;

4) regulation - is the protection of information, in which the probability of unauthorized access becomes minimal;

5) coercion is a kind of information protection in which users and employees of the system are forced to comply with the rules for dealing with protected information - processing, transmission and their use, otherwise they are subject to material or administrative liability;

6) motivation - these are methods of protecting information in which the user and staff are urged not to violate the prescribed order, observing the established moral and ethical norms (regulated and unwritten).

Methods of protecting information are diverse. But one thing is certain - it is necessary to use them in all spheres of life.

Similar articles

 

 

 

 

Trending Now

 

 

 

 

Newest

Copyright © 2018 en.atomiyme.com. Theme powered by WordPress.