PROBLEMS OF IMPLEMENTING EDMS
The basic element of any EDMS is a document, inside the system it can be a file, or it
can be a record in a database. Speaking about a secure document flow, they often mean
precisely the protection of documents, the protection of the information that they carry in
themselves. In this case, it all comes down to the already banal task of protecting data from
unauthorized access. There is a big misconception here, because we are talking specifically
about protecting the system, and not just about protecting the data inside it. This means that it is
also necessary to protect its performance, to ensure quick recovery after damage, failures, and
even after destruction. The system is like a living organism, it is not enough to protect only the
contents of its cells, it is also necessary to protect the connections between them and their
performance. Therefore, an integrated approach is required to protect the electronic document
management system, which implies protection at all levels of the EDMS[12]. Starting from the
protection of physical media, data on them, and ending with organizational measures. For this,
while ensuring information security in the EDMS, an integrated approach is required, which
implies protection at all levels of the EDMS (Fig. 1).
Despite the fact that a lot has been written and talked about authentication over the past
five to eight years, questions of the practical application of certain authentication technologies
have to be addressed more and more often. For example, in order to achieve the fastest result,
many participants in the organization of secure electronic document circulation are trying to
use identification technologies instead of authentication technologies. A typical case is the use
of biometric identification methods. Despite the external attractiveness of the solution (no need
to carry a smart card with you and remember the PIN code), this technology is too expensive in
practice and does not provide the required level of reliability (allowing errors of the first and
second kind) [13]. In a number of cases, the identification process, in principle, does not allow
to guarantee unambiguous identity. A simple and understandable example for everyone: you
presented your passport. This is the identification of a person by a document. However, the
photo can be replaced (there are many such cases) or someone has successfully made up for
you. But if, during the passport check, you were asked questions that only you can answer, and
you answered all the questions correctly, this would be a full-fledged authentication, that is,
confirmation of authenticity [14].
Do'stlaringiz bilan baham: |