Paper Title (use style: paper title)



Download 28,27 Kb.
bet2/2
Sana02.01.2022
Hajmi28,27 Kb.
#311888
1   2
Security protocols for paper records

Despite widespread digitalization, traditional paper documents are still used in organizations. They contain a wealth of information - accounting information, marketing information, financial performance and other critical data. Having obtained these documents, an attacker can analyze the scale of the organization's activities, learn about the directions of financial flows.

Special secrecy protocols are used to protect documents containing critical information. Storage, movement and copying of such files is carried out according to special rules that exclude the possibility of contact with unauthorized persons.



  1. PC data protection

To protect information stored on hard drives of computers, multistage encryption and authorization tools are used. When loading the operating system, a complex password is used, which cannot be guessed by conventional methods. The ability to log on to the user from the outside is eliminated by encrypting data in the BIOS and using passwords to enter disk partitions.

For mission-critical devices, use the Trusted Boot module. It is a hardware controller that is installed on the computer's motherboard. It works only with trusted users and locks the device when it tries to turn on in the absence of the owner.

Cryptographic data encryption methods are also used that turn text "outside the system" into a meaningless set of characters.

These measures ensure the protection of information and allow you to keep it intact.


  1. Defining protection levels

From a methodological point of view, the information protection process can be divided into four stages:

    • prevention - preventive measures, limiting the access of unauthorized persons;

    • detection - a set of actions taken to identify abuse;

    • limitation - a mechanism for reducing losses if the previous measures were bypassed by the attackers;

    • restoration - reconstruction of information arrays, which is carried out according to an approved and proven methodology.

Each stage requires the use of their own means of information protection, special events. It should be borne in mind that the above division is conditional. The same actions can be assigned to different levels.

  1. Preventing network attacks

Computers connected to the Internet are constantly at risk of malware infection. There is a ton of software designed to keep track of passwords, bank card numbers, and other data. Viruses are often found in e-mails, get into the system through questionable network resources or downloaded programs.

To protect the system from malware, it is necessary to use anti-virus applications to restrict Internet access to certain sites. If your organization uses LANs in parallel, you should install firewalls (firewalls).

Most users store information in separate folders called "Passwords", "My cards", etc. For an attacker, such names are hints. In the names of such files, it is necessary to use combinations of letters and numbers that do not say anything to strangers. It is also recommended to encrypt valuable data in computers and back them up periodically.

The competent use of information security systems allows you to achieve favorable results [7]:



    • reduce the risks of loss of reputation and loss of funds;

    • eliminate the loss of scientific research, intellectual property, personal data;

    • reduce the cost of measures to protect information, exclude unauthorized access to valuable information.

Also, the information security service should set up security policies for all departments and employees working with confidential information of various types:

    • financial documentation;

    • client databases;

    • scientific and technological developments, other intellectual property;

    • information constituting banking secrecy;

    • personal information of employees or other persons.

Each employee should be able to work only with the information he needs to perform his job duties. This eliminates the misuse of information, leakage or copying of data for hostile purposes.

CONCLUTION



Unauthorized access to information is possible in any system from small organizations to large government structures. Careful attention to the protection of information, the creation of information security departments allows you to minimize losses and prevent attempts to steal or copy data. Special attention should be paid to working with authorized personnel who have access to critical information. Protection measures must be taken in advance, since giving up the initiative means allowing data loss.

REFERENCES



  1. Abstract of lectures on discipline "Architecture of ASOIU". M.: MGTU of N.E. Bauman. 2018. (manuscript of the student)

  2. Hares V.P., Shelupanov A.A. Technical means and methods of information security. Tomsk: In - the Range. 2016. - 383 pages.

  3. Касперски Крис. Искусство дизассемблирования / Крис Касперски, Ева Рокко. М.: БХВ-Петербург, 2019. 896 c.

  4. Колисниченко Д.Н. Анонимност и безопасност в Интернете. От «чайника» к ползователю / Д.Н. Колисниченко. М.: БХВ-Петербург, 2020. 240 c.

  5. Руководство для программиста на Жава. 75 рекомендатсий по написанию надежних и зашишенних программ. М.: Вильямс, 2014. 256 c.

  6. Соколов А.В. Зашита от компьютерного терроризма. Справочное пособие / А.В. Соколов, О.М. Степанюк. Москва: СИНТЕГ, 2020. 496 c.

  7. Эриксон Джон. Хакинг. Искусство эксплойта / Джон Эриксон. М.: Символ- плюс, 2019. 512 c.

Download 28,27 Kb.

Do'stlaringiz bilan baham:
1   2




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish