ComputersInformation Technology

Software of information protection - the basis of the work of the computer network

Software and hardware means of information protection are a complex of special programs, the function of which is, as is easy to guess, the protection of information. The main directions in which software tools are used to protect information are as follows:

- Information protection (hereinafter IS) from unauthorized access;
- FROM FROM COPYING;
- FROM FROM malware;
- cryptographic protection of data;
- software protection of data transmission channels .

Information protection against unauthorized access

To protect the information system from someone else's intrusion, certain security measures must be followed. So, the software protects information identifies subjects and objects, delineates access to information and computing resources, monitors and records actions with target objects.

Identification and confirmation of authenticity means checking the subject who wants to gain access to whether he is actually what he claims to be. The most common way to identify is to check using a password. However, as practice shows, password protection is by no means the best way to protect data, because the password can be overheard, peeped, intercepted, and even completely unraveled.

After successfully passing the identification procedure, the subject gets the opportunity to work with the resources of the computer system, which is further protected at the hardware and software levels, as well as at the data level.

Information protection against copying

Software tools to protect information against illegal copying prevent the distribution of illegal copies of the software and currently represent the only reliable tool that can protect the copyright of developers. The essence of the work of these tools is simple: the program will perform its functions only if some unique uncopable element is recognized. The role of such an element (key) can be assigned to a specific part of the computer or to a special device.

Information protection against destruction

Any protection system has a primary purpose: it must protect information from destruction. Since data destruction can occur due to a wide variety of reasons (unauthorized actions, software and hardware failures, computer viruses, etc.), the organization of protective measures should become one of the most important tasks of each user.

It is also worth noting separately the danger posed by small but quite complex and harmful programs - computer viruses that are able to spread themselves on their own, as well as being introduced into other people's programs and transmitted over the network. The creators of viruses can pursue a variety of goals: from the innocuous output of a message to the complete destruction of information and the destruction of the system.

Cryptographic data protection

The cryptography method has become one of the main and most powerful tools that provide confidentiality and data integrity control, which software security tools possess. The main element of cryptography is the encryption or conversion of data into an unreadable form using special encryption keys.

Software protection of data transmission channels

The basis of this direction in the field of security are screens - software tools for protecting information in networks whose purpose is to restrict the access of users belonging to the same network set to the servers of another network set. The screens monitor all information flows passing between the two networks. An example of a screen can serve as a firewall (firewall), installed to protect the local network of the organization, which has access to an open environment (for example, the Internet).

Similar articles

 

 

 

 

Trending Now

 

 

 

 

Newest

Copyright © 2018 en.delachieve.com. Theme powered by WordPress.