Security protocols for paper records
Despite widespread digitalization, traditional paper documents are still used in organizations. They contain a wealth of information - accounting information, marketing information, financial performance and other critical data. Having obtained these documents, an attacker can analyze the scale of the organization's activities, learn about the directions of financial flows.
Special secrecy protocols are used to protect documents containing critical information. Storage, movement and copying of such files is carried out according to special rules that exclude the possibility of contact with unauthorized persons.
PC data protection
To protect information stored on hard drives of computers, multistage encryption and authorization tools are used. When loading the operating system, a complex password is used, which cannot be guessed by conventional methods. The ability to log on to the user from the outside is eliminated by encrypting data in the BIOS and using passwords to enter disk partitions.
For mission-critical devices, use the Trusted Boot module. It is a hardware controller that is installed on the computer's motherboard. It works only with trusted users and locks the device when it tries to turn on in the absence of the owner.
Cryptographic data encryption methods are also used that turn text "outside the system" into a meaningless set of characters.
These measures ensure the protection of information and allow you to keep it intact.
Defining protection levels
From a methodological point of view, the information protection process can be divided into four stages:
prevention - preventive measures, limiting the access of unauthorized persons;
detection - a set of actions taken to identify abuse;
limitation - a mechanism for reducing losses if the previous measures were bypassed by the attackers;
restoration - reconstruction of information arrays, which is carried out according to an approved and proven methodology.
Each stage requires the use of their own means of information protection, special events. It should be borne in mind that the above division is conditional. The same actions can be assigned to different levels.
Preventing network attacks
Computers connected to the Internet are constantly at risk of malware infection. There is a ton of software designed to keep track of passwords, bank card numbers, and other data. Viruses are often found in e-mails, get into the system through questionable network resources or downloaded programs.
To protect the system from malware, it is necessary to use anti-virus applications to restrict Internet access to certain sites. If your organization uses LANs in parallel, you should install firewalls (firewalls).
Most users store information in separate folders called "Passwords", "My cards", etc. For an attacker, such names are hints. In the names of such files, it is necessary to use combinations of letters and numbers that do not say anything to strangers. It is also recommended to encrypt valuable data in computers and back them up periodically.
The competent use of information security systems allows you to achieve favorable results [7]:
reduce the risks of loss of reputation and loss of funds;
eliminate the loss of scientific research, intellectual property, personal data;
reduce the cost of measures to protect information, exclude unauthorized access to valuable information.
Also, the information security service should set up security policies for all departments and employees working with confidential information of various types:
financial documentation;
client databases;
scientific and technological developments, other intellectual property;
information constituting banking secrecy;
personal information of employees or other persons.
Each employee should be able to work only with the information he needs to perform his job duties. This eliminates the misuse of information, leakage or copying of data for hostile purposes.
CONCLUTION
Unauthorized access to information is possible in any system from small organizations to large government structures. Careful attention to the protection of information, the creation of information security departments allows you to minimize losses and prevent attempts to steal or copy data. Special attention should be paid to working with authorized personnel who have access to critical information. Protection measures must be taken in advance, since giving up the initiative means allowing data loss.
REFERENCES
Abstract of lectures on discipline "Architecture of ASOIU". M.: MGTU of N.E. Bauman. 2018. (manuscript of the student)
Hares V.P., Shelupanov A.A. Technical means and methods of information security. Tomsk: In - the Range. 2016. - 383 pages.
Касперски Крис. Искусство дизассемблирования / Крис Касперски, Ева Рокко. М.: БХВ-Петербург, 2019. 896 c.
Колисниченко Д.Н. Анонимност и безопасност в Интернете. От «чайника» к ползователю / Д.Н. Колисниченко. М.: БХВ-Петербург, 2020. 240 c.
Руководство для программиста на Жава. 75 рекомендатсий по написанию надежних и зашишенних программ. М.: Вильямс, 2014. 256 c.
Соколов А.В. Зашита от компьютерного терроризма. Справочное пособие / А.В. Соколов, О.М. Степанюк. Москва: СИНТЕГ, 2020. 496 c.
Эриксон Джон. Хакинг. Искусство эксплойта / Джон Эриксон. М.: Символ- плюс, 2019. 512 c.
Do'stlaringiz bilan baham: |