Computers, Information Technology
Software of information protection - the basis of the work of the computer network
Software and hardware means of information protection are a complex of special programs, the function of which is, as is easy to guess, the protection of information. The main directions in which software tools are used to protect information are as follows:
- Information protection (hereinafter IS) from unauthorized access;
- FROM FROM COPYING;
- FROM FROM malware;
- cryptographic protection of data;
- software protection of data transmission channels .
Information protection against unauthorized access
Identification and confirmation of authenticity means checking the subject who wants to gain access to whether he is actually what he claims to be. The most common way to identify is to check using a password. However, as practice shows, password protection is by no means the best way to protect data, because the password can be overheard, peeped, intercepted, and even completely unraveled.
After successfully passing the identification procedure, the subject gets the opportunity to work with the resources of the computer system, which is further protected at the hardware and software levels, as well as at the data level.
Information protection against copying
Information protection against destruction
Any protection system has a primary purpose: it must protect information from destruction. Since data destruction can occur due to a wide variety of reasons (unauthorized actions, software and hardware failures, computer viruses, etc.), the organization of protective measures should become one of the most important tasks of each user.
It is also worth noting separately the danger posed by small but quite complex and harmful programs - computer viruses that are able to spread themselves on their own, as well as being introduced into other people's programs and transmitted over the network. The creators of viruses can pursue a variety of goals: from the innocuous output of a message to the complete destruction of information and the destruction of the system.
Cryptographic data protection
The cryptography method has become one of the main and most powerful tools that provide confidentiality and data integrity control, which software security tools possess. The main element of cryptography is the encryption or conversion of data into an unreadable form using special encryption keys.
Software protection of data transmission channels
The basis of this direction in the field of security are screens - software tools for protecting information in networks whose purpose is to restrict the access of users belonging to the same network set to the servers of another network set. The screens monitor all information flows passing between the two networks. An example of a screen can serve as a firewall (firewall), installed to protect the local network of the organization, which has access to an open environment (for example, the Internet).
Similar articles
Trending Now