Education of the republic of uzbekistan tashkent state technical university named after islam karimov



Download 17,18 Mb.
Pdf ko'rish
bet157/276
Sana22.07.2022
Hajmi17,18 Mb.
#840106
1   ...   153   154   155   156   157   158   159   160   ...   276
Bog'liq
Сборник журналя Техника Инновэйшн

PROBLEMS OF IMPLEMENTING EDMS 
 
The basic element of any EDMS is a document, inside the system it can be a file, or it 
can be a record in a database. Speaking about a secure document flow, they often mean 
precisely the protection of documents, the protection of the information that they carry in 
themselves. In this case, it all comes down to the already banal task of protecting data from 
unauthorized access. There is a big misconception here, because we are talking specifically 
about protecting the system, and not just about protecting the data inside it. This means that it is 
also necessary to protect its performance, to ensure quick recovery after damage, failures, and 
even after destruction. The system is like a living organism, it is not enough to protect only the 
contents of its cells, it is also necessary to protect the connections between them and their 
performance. Therefore, an integrated approach is required to protect the electronic document 
management system, which implies protection at all levels of the EDMS[12]. Starting from the 
protection of physical media, data on them, and ending with organizational measures. For this, 
while ensuring information security in the EDMS, an integrated approach is required, which 
implies protection at all levels of the EDMS (Fig. 1). 
Despite the fact that a lot has been written and talked about authentication over the past 
five to eight years, questions of the practical application of certain authentication technologies 
have to be addressed more and more often. For example, in order to achieve the fastest result, 
many participants in the organization of secure electronic document circulation are trying to 
use identification technologies instead of authentication technologies. A typical case is the use 
of biometric identification methods. Despite the external attractiveness of the solution (no need 
to carry a smart card with you and remember the PIN code), this technology is too expensive in 
practice and does not provide the required level of reliability (allowing errors of the first and 
second kind) [13]. In a number of cases, the identification process, in principle, does not allow 
to guarantee unambiguous identity. A simple and understandable example for everyone: you 
presented your passport. This is the identification of a person by a document. However, the 
photo can be replaced (there are many such cases) or someone has successfully made up for 
you. But if, during the passport check, you were asked questions that only you can answer, and 
you answered all the questions correctly, this would be a full-fledged authentication, that is, 
confirmation of authenticity [14]. 



Download 17,18 Mb.

Do'stlaringiz bilan baham:
1   ...   153   154   155   156   157   158   159   160   ...   276




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish