ComputersSoftware

Methods of information protection in computer technology

The ubiquitous proliferation of computer technology raises in front of modern users completely new issues that have never been encountered before. In particular, it is necessary to know how to protect information presented in digital form. The need for this is due to the use of computers not only as local computer stations, but also as constituent nodes of global networks. For example, ways to protect the information of a computer that is not connected to the network worry its owner to a much lesser degree than when several computers are connected to a common network. Obviously, in the second case, security is lower. Although this introduces some differences in the way information is protected, the old scheme is still relevant, in which data security is based on three basic components: hardware, software and communication. By the way, the latter is true both for living people (communication) and for intercomputer exchange of data packets.

The software ways to protect information are fairly simple: it is a password-based access control system, lists of allowed users (IP addresses and other identifiers), antivirus applications, information coding , etc. For the end user, interaction with data protected by these types of security systems is most understandable and Convenient, but their effectiveness should always be maintained at the proper level. The level of protection implemented by software, despite their apparent perfection, is incomplete. It is enough to get acquainted with that huge list of updates, which must be constantly installed to maintain protection in the current state. The disadvantage of this approach to solving the problem is the complexity of the software, which is already not too simple. In addition, in some cases, it is possible to slow down work with the protected data.

Software data protection is conditionally divided into:

- prevention of unauthorized access ;

- blocking copy functions;

- reservation of important data;

- analysis of the level of protection;

- limiting the capabilities of the user-visitor.

Hardware information protection tools implement a completely different approach to the issue. Obvious advantages are speed and high reliability. For example, it is allowed to enter a list of users that are allowed access to the gateway filtering device. Also, more and more often special hardware electronic keys are used, only with the help of which it is possible to work with the protected information. In addition to preventing deliberate unauthorized access, hardware often offers protection against unintentional actions that threaten data security. For example, if there are necessary elements of the system, it is possible to use automatic reservation of the specified data. Power outages that directly threaten the safety of information are easily leveled by the inclusion of emergency sources, etc. Although hardware appears to be no less reliable than software, some features do not allow only with their help to create an absolutely reliable protection system.

The most promising option is comprehensive information protection, combining both software and hardware security of information. It is often impossible to indicate to which class a particular defense mechanism belongs. Thus, scanning devices that accurately identify a user can not work without the support of software, but, in fact, are hardware. The password-based authentication system is also increasingly using a solution that, in addition to the direct water of the password, requires sending a confirmation code from some device.

It is recommended to use complex solutions, as more effective, universal and flexible in customization.

Similar articles

 

 

 

 

Trending Now

 

 

 

 

Newest

Copyright © 2018 en.unansea.com. Theme powered by WordPress.