Contacts

Methods of organizing an information security system. Methods and means of ensuring information security of an organization (firm)

Information Security Russian Federation is one of the components of the national security of the Russian Federation and affects the protection of the national interests of the Russian Federation in various spheres of the life of society and the state. Threats to the information security of the Russian Federation and methods of ensuring it are common to these areas.

Various spheres of life have their own characteristics of ensuring information security, associated with the specifics of security facilities, the degree of their vulnerability to threats to the information security of the Russian Federation.

General methods of ensuring the information security of the Russian Federation are divided into legal, organizational, technical and economic.

Rice. 5.1.Information security methods

TO legal methods ensuring the information security of the Russian Federation includes the development of normative legal acts governing relations in the information sphere, and regulatory methodological documents on issues of ensuring the information security of the Russian Federation.

The most important areas of this activity are:

 making amendments and additions to the legislation of the Russian Federation regulating relations in the field of information security, in order to create and improve the information security system of the Russian Federation, eliminate internal contradictions in federal legislation, contradictions related to international agreements to which the Russian Federation has joined, and contradictions between federal legislative acts and legislative acts of the constituent entities of the Russian Federation, as well as in order to concretize the legal norms establishing responsibility for offenses in the field of ensuring the information security of the Russian Federation;



 legislative differentiation of powers in the field of ensuring the information security of the Russian Federation between federal bodies of state power and bodies of state power of the constituent entities of the Russian Federation, determination of goals, objectives and mechanisms for participation in this activity of public associations, organizations and citizens;

 development and adoption of regulatory legal acts of the Russian Federation establishing liability of legal entities and individuals for unauthorized access to information, its illegal copying, distortion and illegal use, deliberate dissemination of inaccurate information, illegal disclosure of confidential information, use for criminal and selfish purposes service information or information containing commercial secrets;

Clarification of the status of foreign news agencies, the media and journalists, as well as investors in attracting foreign investment for the development of the information infrastructure of Russia;

 legislative consolidation of the development priority national networks communications and domestic production of space communications satellites;

 determination of the status of organizations providing services of global information and telecommunication networks on the territory of the Russian Federation, and legal regulation of the activities of these organizations;

 creation of a legal basis for the formation in the Russian Federation of regional structures for ensuring information security.

To organizational and technical methods ensuring the information security of the Russian Federation include:

 creation and improvement of the information security system of the Russian Federation;

 Strengthening the law enforcement activity of federal executive bodies, executive bodies of the constituent entities of the Russian Federation, including the prevention and suppression of offenses in the information sphere, as well as the identification, exposure and prosecution of persons who have committed crimes and other offenses in this area;

 development, use and improvement of information protection means and methods of control over the effectiveness of these means, development of secure telecommunication systems, increasing the reliability of special software;

 creation of systems and means to prevent unauthorized access to processed information and special effects that cause destruction, destruction, distortion of information, as well as changing the regular modes of operation of systems and means of informatization and communication;

Identification technical devices and programs that pose a threat to the normal functioning of information and telecommunication systems, preventing interception

information on technical channels, application cryptographic means protection of information during its storage, processing and transmission via communication channels, control over the implementation of special requirements for the protection of information;

 certification of information security means, licensing of activities in the field of state secret protection, standardization of methods and means of information security;

 improvement of the certification system for telecommunication equipment and software for automated information processing systems in accordance with information security requirements;

 control over the actions of personnel in protected information systems, training of personnel in the field of ensuring information security of the Russian Federation;

 formation of a system for monitoring indicators and characteristics of information security of the Russian Federation in the most important spheres of life and activities of society and the state.

To economic methods providing information

security of the Russian Federation include:

 development of programs for ensuring information security of the Russian Federation and determination of the procedure for their financing;

 improvement of the system of financing of works related to the implementation of legal and organizational and technical methods of information protection, creation of a system of insurance of information risks of individuals and legal entities.

Ensuring the information security of the Russian Federation in the economic sphere plays a key role in ensuring the national security of the Russian Federation.

The following are most susceptible to threats to the information security of the Russian Federation in the economic sphere:

 system of state statistics;

 credit and financial system;

 information and accounting automated systems of subdivisions of federal executive bodies that ensure the activities of society and the state in the economic sphere;

 accounting systems of enterprises, institutions and organizations, regardless of the form of ownership;

 systems for collecting, processing, storing and transferring financial, exchange, tax, customs information and information about the foreign economic activity of the state, as well as enterprises, institutions and organizations, regardless of their form of ownership.

The transition to market relations in the economy caused the appearance on the domestic Russian market goods and services of many domestic and foreign commercial structures - producers and consumers of information, means of informatization and information protection. The uncontrolled activities of these structures to create and protect systems for collecting, processing, storing and transmitting statistical, financial, exchange, tax, customs information creates a real threat to Russia's security in the economic sphere. Similar threats arise with the uncontrolled involvement of foreign firms in the creation of such systems, since this creates favorable conditions for unauthorized access to confidential economic information and for control over the processes of its transfer and processing by foreign special services.

The critical state of enterprises of national industries, developing and producing means of informatization, telecommunications, communications and information protection, leads to the widespread use of appropriate imported funds, which creates a threat of the emergence of technological dependence of Russia on foreign states.

A serious threat to the normal functioning of the economy as a whole is posed by computer crimes associated with the penetration of criminal elements into the computer systems and networks of banks and other credit organizations.

Insufficiency of the regulatory legal framework defining the responsibility of economic entities for the inaccuracy or concealment of information about their commercial activities, about the consumer properties of the goods and services they produce, about the results of their economic activities, about investments and the like, hinders the normal functioning of business entities. At the same time, significant economic damage to business entities can be caused due to the disclosure of information containing commercial secrets. In systems for collecting, processing, storing and transferring financial, stock, tax, and customs information, the most dangerous are illegal copying of information and its distortion due to deliberate or accidental violations of the technology of working with information, unauthorized access to it. This also applies to federal executive bodies engaged in the formation and dissemination of information on the foreign economic activity of the Russian Federation.

The main measures to ensure the information security of the Russian Federation in the economic sphere are:

Organization and implementation of state control over the creation, development and protection of systems and means of collection, processing,

storage and transmission of statistical, financial, stock, tax, customs information;

 radical restructuring of the state statistical reporting system in order to ensure the reliability, completeness and security of information, carried out by introducing strict

legal responsibility of officials for the preparation of primary information, organization of control over the activities of these persons and services for the processing and analysis of statistical information, and

also by limiting the commercialization of such information;

 development of national certified information security tools and their introduction into systems and means of collection, processing, storage and transmission of statistical, financial, stock, tax, and customs information;

 development and implementation of national secure electronic payment systems based on smart cards, electronic money systems and electronic commerce, standardization of these systems, as well as the development of a regulatory legal framework governing their use;

 improvement of the legal framework governing information relations in the economic sphere;

 improvement of methods of selection and training of personnel for work in systems of collection, processing, storage and transmission of economic information.

The most important objects of ensuring the information security of the Russian Federation in the field of science and technology are:

 the results of fundamental, exploratory and applied scientific research, potentially important for the scientific and technical, technological and socio-economic development of the country, including information, the loss of which may damage the national interests and prestige of the Russian

Federation;

 discoveries, non-patented technologies, industrial designs, utility models and experimental equipment;

 scientific and technical personnel and the system of their training;

• control systems for complex research complexes (nuclear reactors, particle accelerators, plasma generators, etc.).

Access limitation.

Access restriction consists in the creation of some physical closed barrier around the protected object with the organization of controlled access for persons associated with the protected object by

their functional responsibilities.

Restricting access to an automated information processing system (ASOI) consists of:

 in the allocation of a special area for the placement of ASOI;

• in equipment along the perimeter of a dedicated area of ​​special fences with burglar alarms;

• in the construction of special buildings or other structures;

 in the allocation of special premises in the building;

 in the creation of a checkpoint regime on the territory, in buildings and premises.

The task of the means of restricting access is to exclude accidental and deliberate access of unauthorized persons to the territory where the ASOI is located and directly to the equipment. For these purposes, a protective contour is created, closed by two types of barriers: physical and checkpoint. Such barriers are often referred to as burglar alarm and access control systems.

Traditional means of control over access to the protected area consist in the production and issuance of special passes to admitted persons with a photograph of the owner's identity and information about him placed on them. These passes can be stored by the owner or directly in the security access booth. In the latter case, the admitted person gives his surname and his number, or dials it on a special panel of the cabin when passing through the turnstile, the pass certificate falls out of the slot and goes into the hands of the security officer, who visually verifies the owner's identity with the picture in the photo, the named surname with the surname on pass. The effectiveness of the protection of this system is higher than the first. At the same time, the loss of the pass, its interception and forgery are excluded. In addition, there is a reserve in increasing the efficiency of protection by increasing the number of checked parameters. However, the main burden of control falls on the person, and he, as you know, can be wrong.

The parameters to be checked include biometric methods of human authentication.

Biometric technology

Biometric technologies are the identification of a person by unique biological characteristics inherent only to him.

Today biometric access systems are the most reliable. An important factor in increasing the popularity of biometric security is their ease of use, so they are becoming available to home users.

Rice. 5.2.Statistics

Fingerprints

Fingerprint identification of a person is the most common method used by biometric information security systems. There are three fingerprint technologies today. The first is the use of optical scanners. The principle of operation of these devices is almost identical to the principle of operation of conventional scanners. The main advantage of optical scanners is their low cost. The disadvantages include the fact that these are very capricious devices that require constant care. Dust, dirt and scratches can deny admission to a legal user, in addition, the print obtained with an optical scanner is highly dependent on the condition of the skin. Oily or, conversely, dry and even more cracked skin can cause blurred images and the inability to identify a person.

The second technology is based on the use of electrical rather than optical scanners. Its essence is as follows. The user puts his finger on a special plate, which is

consists of a silicon substrate containing 90 thousand capacitor plates with a readout step of 500 dpi. In this case, a kind of capacitor is obtained. One plate is the surface of the sensor, the other is the human finger. And since the potential of the electric field inside the capacitor depends on the distance between the plates, the map of this field repeats the papillary pattern of the finger.

The electric field is measured and the received data is converted to eight-bit bitmap... The advantages of this technology include the very high accuracy of the obtained fingerprint, which does not depend on the condition of the user's skin.

The system works great even if a person's finger is dirty. In addition, the device itself is small in size, which allows it to be used in many places. But there is

electric scanner also has disadvantages. First, the manufacture of a sensor containing 90,000 capacitor plates is quite expensive. Secondly, the silicon crystal underlying the scan-

ra, requires a sealed enclosure. And this imposes additional restrictions on the conditions of use of the system, in particular on the external environment, the presence of vibration and shock. Thirdly, refusal to work in the presence of strong electromagnetic radiation.

The third human fingerprint identification technology is TactileSense, developed by Who Vision Systems. These scanners use a special polymer material that is sensitive to the electric field difference between the ridges and depressions of the skin. That is, in fact, the principle of operation of TactileSense devices is the same as that of electrical scanners, but they have a number of advantages. First, the cost of manufacturing a polymer sensor is hundreds of times less than the price of a silicon one.

Second, the absence of a fragile base ensures high durability of both the scanner surface and the entire device. The third is the miniature size of the sensor. In fact, to obtain a print, you only need a plate with an area equal to the area of ​​the fingertip and only 0.075 mm thick. To this you need to add a little electronic stuffing. The resulting sensor is so small that it can be built into almost any computer device without any damage.

Eyes

The human eye has two characteristics that are unique to each person. These are the retina and iris. The first one has been used for a long time to build biometric information security systems. In these systems, the scanner detects either the pattern of the fundus blood vessels, or the reflecting and absorbing characteristics of the retina itself. Both of these technologies are considered the most reliable biometric technologies. The retina cannot be faked, it cannot be photographed or removed from anywhere, like a fingerprint. However, there are more than enough drawbacks in systems working with the retina.

Firstly, it is the high cost of scanners and their large dimensions.

Secondly, the analysis of the resulting image takes a long time (at least one minute). Thirdly, the scanning procedure is unpleasant for a person. The fact is that the user must look at a certain point during this process. Moreover, scanning is carried out using an infrared beam, which causes a person to experience painful sensations. And, finally, fourthly, there is a significant deterioration in the quality of the image in some diseases, such as cataracts. This means that people

visually impaired will not be able to use this technology.

The lack of identification of a person by the retina of the eye has led to the fact that this technology is poorly suited for use in information security systems. Therefore, it is most widely used in access systems to secret scientific and military facilities.

The situation is different with systems that use the iris for identification. For their work, only a special software and a camera. The principle of operation of such systems is very simple. The camera captures a person's face.

The program extracts the iris from the resulting image. Then, according to a certain algorithm, a digital code is built, according to which identification is carried out. This method has a number of advantages. First, the small price. Secondly, impaired vision does not interfere with scanning and encoding of identifying parameters. Thirdly, the camera does not cause any discomfort to users.

Face

Today there are two biometric technologies that use his face to identify a person. The first one is special software that takes an image from a webcam and processes it. Separate objects are highlighted on the face (eyebrows, eyes, nose, lips), for each of which parameters are calculated that completely determine it. However, many modern systems build a three-dimensional image of a person's face. This is necessary in order for identification to be possible, for example, when tilting the head and turning at a slight angle. The advantage of such systems is one thing - this is the price. After all, to work, you only need special software and a webcam, which has already become a familiar attribute of many computers. There are many more disadvantages of identifying a person by face shape. The main disadvantage is low accuracy. A person during identification may not turn his head so, or his face may not have the expression that is stored in the database. In addition, the system is likely to deny access to a woman who has made up differently than usual, for example by changing the shape of the eyebrows. You can also remember the twins, whose face shape is almost identical.

The second technology, based on the identification of a person by his face, uses a thermogram. The fact is that human arteries, of which there are quite a few on the face, emit heat. Therefore, having photographed the user with a special infrared camera, the system receives a "map" of the location of the arteries, which is called a thermogram. It is different for each person. Even in identical twins, the arteries are located differently. Therefore, the reliability of this method is quite high.

juice. Unfortunately, it appeared recently and has not yet received wide distribution.

Palm

As in the previous case, there are two ways to identify a person by palm. The first uses its shape. The system is based on a special device. It consists of a camera and several illuminating diodes. The main task of this device is to build a three-dimensional image of the palm, which is then compared with the reference data. The reliability of this identification method is quite high. But the palm-scanning device is a rather fragile device. Therefore, the conditions for its use are limited.

The second biometric technology, which uses the human palm, uses a thermogram for identification. In general, this method is completely identical to the user definition.

on the thermogram of the face, so that its advantages and disadvantages are accurate

the same.

Dynamic characteristics

Dynamic parameters are behavioral characteristics, that is, those that are built on the features characteristic of subconscious movements in the process of reproducing an action. The most commonly used biometric systems are voice, handwriting and keyboard handwriting.

The main advantages of systems that identify people by voice are low cost and convenience for both users and administrators. This requires special software and a microphone connected to the computer. The disadvantages of biometric systems using voice, first of all, should be attributed to the rather low reliability. The fact is that, using modern high-quality devices, it is possible to record and reproduce a human voice.

and there is no guarantee that the system will recognize the counterfeit. In addition, a cold can slightly alter the user's voice, resulting in access being denied.

A personal signature has been used to identify a person for many centuries. The first computer systems using this parameter simply compared the resulting image.

with the standard. Unfortunately, this identification method is very unreliable. If desired, an attacker can practice and easily forge almost any signature. Therefore, modern systems not only compare two pictures, but also measure the dynamic characteristics of writing (the time of applying the signature, the dynamics of pressure on the surface, etc.). Naturally, this requires special equipment. In most cases, the computer is equipped with a touch surface similar to a graphics tablet. But more and more popularity is gained by special "pens" capable of measuring the degree of pressure during "writing" and other parameters. Their main advantage over sensory surfaces is the minimum occupied space, which significantly expands the field of application of biometric systems of this class.

The most common way of identifying a person by dynamic characteristics is with keyboard handwriting. The fact is that each person types in their own way on the keyboard.

Therefore, according to certain characteristics, it is possible to identify the user with a fairly high accuracy. The advantages of such systems are obvious. First, no additional hardware is needed. Secondly, identification is very convenient for the user: he enters a regular password, but in fact the system determines exactly whether the person sitting at the computer has the right to access

to information. The main disadvantage of using a keyboard handwriting for personal identification is a temporary change in this very handwriting in users under the influence of stressful situations. Which, in turn, can lead to denial of access to a person who has the right to do so.

It should be noted that the situation on the biometric systems market is changing very quickly. New, more reliable and often cheaper technologies are constantly emerging.

The improvement of the access control system is currently being carried out in the direction of improving the design of the pass-identification card by recording the code values ​​of passwords.

The physical barrier of the protective circuit, placed along the perimeter of the protected area, is supplied with a burglar alarm.

Currently, a number of enterprises are producing electronic systems to protect public and private facilities from the penetration of unauthorized persons. The effectiveness of the security alarm system can only be guaranteed if the reliability of all its constituent elements and their coordinated functioning are ensured. In this case, the type of sensor, the method of notification or control, noise immunity, and also the reaction to an alarm are important. Local sound or light alarms may not be sufficient, so it is advisable to connect local security devices to specialized means centralized management, which, upon receiving an alarm signal, send a special guard group.

The status of the sensors can be monitored automatic system located in the control center, or a security officer who is at the facility and takes appropriate measures when a light or sound signal is given. In the first case, local security devices are connected to the center through telephone lines, and a specialized digital device periodically polls the status of the sensors, automatically dialing the number of the transponder located at the protected facility. When an alarm arrives at the center, the automatic system triggers an alert.

Signal sensors are installed on various types of fences, indoors, directly on safes, etc.

When developing an integrated security system for a specific object, its specifics are taken into account: the internal layout of the building, windows, entrance doors, the placement of the most important technical means.

All these factors affect the choice of the type of sensors, their location and determine a number of other features of this system. According to the principle of operation, alarm systems can be classified as follows:

• traditional (conventional), based on the use of signaling and indication circuits in combination with various contacts (sensors);

 ultrasonic;

• beam interruption;

 television;

 radar;

Microwave;

In the process of identifying the branch of law, not only the subject of relations is of great importance, but also the method of its regulation. The entire set of relations regarding information (information resources) is governed by the norms of national law, in this case the Russian Federation, the norms of international law, as well as treaties of the Russian Federation with other states, in general, forming a system of information law.

The most socialized form of information is a sign and, above all, a written form of information presentation. Therefore, the first law specially devoted to information problems - the federal law"On information, informatization and information protection", adopted in 1995. The subject of its regulation is documented information, on the basis of which information resources of different subjects are formed. Foreign legislation, as a rule, speaks of a document as a subject of regulated relations.

The subject of information law is not only information itself, but also the processes associated with its receipt (creation, removal), processing, storage, transmission, distribution, etc. The combination of these actions related to information is called informatics, and the creation of conditions for introducing the latest technologies in working with information - informatization. Thus, information, informatization, communication of information on various types of networks and relations arising in this connection, in the aggregate, constitute the subject area of ​​information law.

More complex is the question of the method of this branch of law. In this case, it is appropriate to talk about methods, and not about one method. And this requires clarification.

Normativeness - the generally binding nature of legal norms (rules) is ensured by a number of conditions. These conditions include:

  • the degree of accuracy of the subject area (sphere) of social life, the activity in which the norms should act, receive implementation;
  • the degree of accuracy, the specificity of the designation of the circle of persons - subjects of law who are obliged to comply with legal prescriptions; - targeting of norms;
  • legalization of the content of behavior or relations of subjects of law;
  • ways, in organizational terms - mechanisms, ensuring the execution of the will of the subject - the legislator (creator of regulatory prescriptions), the content of the prescription.

If the first two conditions are provided in the process of determining the subject of legal regulation, then the content of the norms of law (instructions), as well as the methods of guaranteeing the implementation of the norms, are directly related to the methods of legal regulation.

It is important to establish the main features of regulation in the information sphere. In this regard, it is necessary to recall what goals are solved by this category of law:

  • an instruction to act in a certain way in a specific situation (in a situation of a legal fact) within the subject sphere of relations, the definition of rules of behavior, relations of subjects of law;
  • establishment of organizational measures and structures to ensure compliance with established regulations (rules);
  • the establishment of structures, their rights and obligations, acting in cases of violation of the normatively stipulated rules of behavior of subjects of law within the regulated sphere (branch) of relations and implementing coercive and punitive measures in cases of violation of the order provided for by the rules of law.

The all-pervading nature of information determines the fact that an industry is being formed in law that is neither classical nor pure by belonging to any family of one branch of law by the method of regulation. Information law is

It is an industry of the third level of classification - a complex industry according to the methods of legal regulation. Having the most precisely delineated sphere of regulation - information and information activity, this part of the legal system, according to its methods, uses different means and techniques inherent in the entire system of law. Therefore, it is possible to speak not about one method, but about methods, their plurality and variety, complementarity within the same subject area.

The specificity of information law methods - a combination of constitutional regulation, administrative methods of ensuring the specifics of information activities, the involvement of the entire arsenal of regulatory, control, coercive, punitive and incentive measures in the process of ensuring compliance with legislation and the state's response to offenses - also explains the problem of the place of information law in the legal system in the whole. Information law is an industry that is in close contact and interaction with all other branches of law.

The basic branch of law for the regulation of relations related to information activities - relations in the field of communications and communications is administrative law, and on this basis the information law allocated to an independent area should be attributed to the family of administrative law, which does not exclude its connection with other branches of public law (criminal, financial, environmental, etc.).

Introduction

information crypto optical

Information is the most important resource of human society. It is expressed in the multidimensional information potential accumulated over many years, stored in the territory of residence of a given society, that is, on our planet. The ever-increasing volumes of various information (symbolic, text, graphic, etc.) and the expansion of the circle of its users cause the need to control its reliability, to provide protection against unauthorized access, distortion, loss and copying in order to comply with state and world legislation, as well as the rights of information authors ...

Development of new information technologies and universal computerization have led to the fact that information security is not only becoming mandatory, it is also one of the characteristics of the information system. There is a fairly extensive class of information processing systems, in the development of which the security factor plays a primary role (for example, banking information systems).

An information system is called a set of interconnected means that store and process information, also called information and computing systems. The information system receives data from an information source. This data is sent for storage or undergoes some processing in the system and then transferred to the consumer.

Under security information system means the security of the system from accidental or deliberate interference in the normal process of its functioning, from attempts to steal (unauthorized receipt) of information, modification or physical destruction of its components. In other words, it is the ability to counteract various disturbing influences on the information system.

Information security threat refers to events or actions that can lead to distortion, unauthorized use or even destruction of information resources of the managed system, as well as software and hardware.

A person trying to disrupt an information system or gain unauthorized access to information is usually called a cracker or "computer pirate" (hacker).

In their illegal actions aimed at mastering other people's secrets, hackers seek to find such sources of confidential information that would give them the most reliable information in maximum volumes with minimum costs for obtaining it. With the help of various tricks and a variety of techniques and means, ways and approaches to such sources are selected. In this case, the source of information means a material object that has certain information that is of particular interest to attackers or competitors.

At present, to ensure the protection of information, it is necessary not only to develop private protection mechanisms, but to implement a systematic approach, including a set of interrelated measures (use of special hardware and software tools, organizational measures, regulatory legal acts, moral and ethical countermeasures, etc.) ). The comprehensive nature of protection stems from the complex actions of cybercriminals seeking by any means to obtain information that is important to them.

Today it can be argued that a new modern technology is being born - a technology for protecting information in computer information systems and data transmission networks. The implementation of this technology requires increasing costs and efforts. However, all this makes it possible to avoid significantly superior losses and damage that may arise in the real implementation of threats to the information system and information technology.

Information security measures

Information security emphasizes the importance of information in modern society - the understanding that information is a valuable resource, something more than individual pieces of data. Information security refers to measures to protect information from unauthorized access, destruction, modification, disclosure and delays in access. It includes measures to protect the processes of data creation, input, processing and output. The goal of information security is to secure the values ​​of the system, to protect and guarantee the accuracy and integrity of information, and to minimize the damage that can occur if information is modified or destroyed. Information security requires taking into account all events during which information is created, modified, accessed or disseminated

The following areas of information security measures can be distinguished.

Legal

Organizational

Technical

Legal measures should include the development of norms establishing responsibility for computer crimes, protection of copyright of programmers, improvement of criminal and civil legislation, as well as legal proceedings. Legal measures also include issues of public control over the developers of computer systems and the adoption of international treaties on their limitations, if they affect or may affect the military, economic and social aspects of the life of the countries concluding the agreement.

Organizational measures include the protection of the computing center, careful selection of personnel, exclusion of cases of particularly important work by only one person, the presence of a plan for restoring the center's performance after its failure, the organization of servicing the computing center by an outside organization or persons who are not interested in concealing the facts of disruption of the center , the universality of means of protection from all users (including top management), the assignment of responsibility to the persons who must ensure the security of the center, the choice of the location of the center, etc.

Technical measures include protection against unauthorized access to the system, redundancy of especially important computer subsystems, organization of computer networks with the possibility of redistributing resources in the event of a malfunction of individual links, installation of fire detection and extinguishing equipment, water detection equipment, structural measures to protect against theft, sabotage, sabotage, explosions, installation of backup power supply systems, equipping premises with locks, installation of alarms and much more.

Methods, means and conditions for ensuring information security

Methods for ensuring the protection of information at enterprises are:

Obstacle is a method of physically blocking the path of the attacker to the protected information (to equipment, storage media, etc.)

Access control is a method of protecting information by regulating the use of all resources of an enterprise's automated information system. Access control includes the following security features:

Identification of users, personnel and resources of the information system (assigning a personal identifier to each object);

Authentication (identification) of an object or subject by the identifier presented by him;

Authorization check (checking the compliance of the day of the week, time of day, requested resources and procedures with the established regulations);

Permission and creation of working conditions within the established regulations;

Registration (logging) of calls to protected objects and information;

Response (signaling, shutdown, delay in work, refusal to request) when attempting an unauthorized action.

Disguise is a method of protecting information in an automated information system of an enterprise by means of its cryptographic closure.

Regulation is a method of information protection that creates conditions for the automated processing, storage and transmission of protected information, in which the possibility of unauthorized access to it would be minimized.

Coercion is a method of protecting information in which users and system personnel are forced to comply with the rules for processing, transferring and using protected information under the threat of material, administrative or criminal liability.

Incentive is a method of protecting information that encourages users and staff not to violate established rules due to the prevailing moral and ethical standards.

Information security tools

Information security means are a combination of engineering, electrical, electronic, optical and other devices and devices, devices and technical systems, as well as other proprietary elements used to solve various problems of protecting information, including preventing leakage and ensuring the security of protected information. In general, the means of ensuring the protection of information in terms of preventing deliberate actions, depending on the method of implementation, can be divided into groups:

Technical means

These are devices of various types (mechanical, electromechanical, electronic, etc.) that solve information security problems with hardware. They either prevent physical penetration, or, if the penetration did take place, access to information, including by masking it.

To protect the perimeter of the information system, the following are created:

Security and fire alarm systems;

Digital video surveillance systems;

Access control and management systems (ACS). Protection of information from its leakage by technical communication channels is provided by the following means and measures:

Using a shielded cable and laying wires and cables in shielded structures;

Installation of high-frequency filters on communication lines;

Construction of shielded rooms ("capsules");

Use of shielded equipment;

Installation of active noise systems;

Creation of controlled areas.

The advantages of technical means are associated with their reliability, independence from subjective factors, and high resistance to modification. Weaknesses - lack of flexibility, relatively large volume and weight, high cost.

Security controls are resources that provide security.

The considered methods of ensuring security are implemented in practice through the use of various means of protection, such as technical, software, organizational, legislative and moral and ethical. It can be assumed that information protection tools implement the above methods of protecting it, while the same method can be used in different protection tools. For example, an obstacle to access to information can be set by a combination lock on the door, by security personnel, by requiring a password when entering a computer system, etc.

The main remedies used to create a defense mechanism include the following:

1. Technical means are realized in the form of electrical, electromechanical and electronic devices. The entire set of technical means is divided into hardware and physical. By hardware technical means it is customary to understand devices built directly into computing equipment or devices that interface with such equipment via a standard interface.

2. Physical means are realized in the form of autonomous devices and systems. For example, locks on doors where equipment is located, bars on windows, electronic and mechanical security alarm equipment.

3. Software is software specifically designed to perform information security functions.

4. Organizational means of protection are organizational, technical and organizational and legal measures carried out in the process of creating and operating computers, telecommunications equipment to ensure the protection of information. Organizational measures cover all structural elements of equipment at all stages of their life cycle (construction of premises, design of a computer information system for banking, installation and adjustment of equipment, testing, operation).

5. Moral and ethical means of protection are implemented in the form of all kinds of norms that have developed traditionally or are taking shape with the spread of computing technology and communications in society. For the most part, these norms are not mandatory as legislative measures, however, non-compliance with them usually leads to the loss of a person's authority and prestige. The most prominent example of such norms is the Code of Professional Conduct for Members of the United States Computer User Associations.

6. Legislative remedies are determined by the legislative acts of the country, which regulate the rules for the use, processing and transmission of restricted information and establish measures of responsibility for violation of these rules.

All considered means of protection can be somewhat conditionally divided into formal (performing protective functions strictly according to a predetermined procedure without direct human participation) and informal (determined by purposeful human activity or regulate this activity).

Information Security, like information protection, is a complex task aimed at ensuring security, implemented by the implementation of a security system. The problem of information protection is multifaceted and complex and covers a number of important tasks. Information security problems are constantly aggravated by the penetration of technical means of data processing and transmission into all spheres of society and, above all, computing systems.

To date, three basic principles have been formulated that should ensure information security:

data integrity - protection against failures leading to loss of information, as well as protection against unauthorized creation or destruction of data;

confidentiality of information;

When developing computer systems failure or errors in the operation of which can lead to serious consequences, questions computer security become priority. There are many known measures aimed at ensuring computer security, the main ones being technical, organizational and legal ones.

Ensuring the security of information is expensive, not only because of the cost of purchasing or installing security, but also because it is difficult to skillfully define the boundaries of reasonable security and ensure that the system is kept up and running accordingly.

Security features may not be designed, purchased, or installed until appropriate analysis has been performed.

The site analyzes information security and its place in the national security system, identifies vital interests in the information sphere and the threats to them. The issues of information warfare, information weapons, principles, main tasks and functions of ensuring information security, functions state system information security, domestic and foreign standards in the field of information security. Considerable attention is also paid to legal issues of information security.

The general issues of information protection in automated data processing systems (ASOD), the subject and objects of information protection, the tasks of information protection in ASOD are also considered. The types of deliberate security threats and methods of information protection in ASOD are considered. Methods and means of user authentication and differentiation of their access to computer resources, access control to equipment, the use of simple and dynamically changing passwords, methods for modifying the scheme simple passwords, functional methods.

Basic principles of building an information security system.

When building an information security system for an object, one should be guided by the following principles:

Continuity of the process of improving and developing the information security system, which consists in justifying and implementing the most rational methods, methods and ways of protecting information, continuous monitoring, identifying bottlenecks and weaknesses and potential channels of information leakage and unauthorized access.

Comprehensive use of the entire arsenal of available means of protection at all stages of production and processing of information. At the same time, all the tools, methods and measures used are combined into a single, holistic mechanism - an information security system.

Monitoring the functioning, updating and supplementing protection mechanisms depending on changes in possible internal and external threats.

Users are properly trained and comply with all established privacy practices. Without meeting this requirement, no information security system can provide the required level of protection.

The most important condition for ensuring security is legality, sufficiency, maintaining a balance of interests of the individual and the enterprise, mutual responsibility of personnel and management, interaction with state law enforcement agencies.

10) Stages of building information security

Stages of construction.

1. Comprehensive analysis of the information system

enterprises at various levels. Risk analysis.

2. Development of organizational and administrative and

regulatory documents.

3. Training, professional development and

retraining of specialists.

4. Annual reassessment of the state of information

enterprise security

11) Firewall

Firewalls and antivirus packages.

A firewall (sometimes called a firewall) helps improve the security of your computer. It restricts information that comes to your computer from other computers, allowing you to better control the data on your computer and providing your computer's line of defense against people or programs (including viruses and worms) that unauthorizedly try to connect to your computer. Think of a firewall as a border post that inspects information (often called traffic) coming from the Internet or local network... During this check, the firewall rejects or allows information to the computer according to the specified parameters.

What does the firewall protect against?

A firewall MAY:

1. Block computer viruses and "worms" from accessing the computer.

2. Prompt the user to choose whether to block or allow specific connection requests.

3. Keep records (security log) - at the request of the user - recording the allowed and blocked attempts to connect to the computer.

What does the firewall not protect against?

He can not:

1. Detect or neutralize computer viruses and "worms" if they have already entered the computer.

3. Block spam or unauthorized mailings from reaching your inbox.

HARDWARE AND SOFTWARE FIREWALLS

Hardware firewalls- individual devices that are very fast, reliable, but very expensive, so they are usually used only to protect large computer networks. For home users, firewalls built into routers, switches, wireless access points, etc. are optimal. Combined router-firewalls provide double protection against attacks.

Software firewall is a security program. In principle, it is similar to a hardware firewall, but it is more user-friendly: it has more ready-made settings and often has wizards to help you set up. With its help, you can allow or deny other programs access to the Internet.

Antivirus program(antivirus)- any program for detecting computer viruses, as well as unwanted (considered malicious) programs in general and restoring files infected (modified) by such programs, as well as for prophylaxis - preventing infection (modification) of files or operating system malicious code.

12) Classification of computing systems

Depending on the territorial location of subscriber systems

computer networks can be divided into three main classes:

global networks (WAN - Wide Area Network);

regional networks (MAN - Metropolitan Area Network);

Local area networks (LAN - Local Area Network).

Basic LAN Topologies

A LAN topology is a geometric diagram of the connections of network nodes.

Computer network topologies can be very different, but

for local area networks, only three are typical:

Ring,

Star-shaped.

Any computer network can be considered as a collection

Knot- any device directly connected to

the transmission medium of the network.

Ring topology provides for the connection of network nodes with a closed curve - a transmission medium cable. The output of one host is connected to the input of another. Information on the ring is transmitted from node to node. Each intermediate node between the transmitter and the receiver relays the sent message. The receiving node recognizes and receives only messages addressed to it.

A ring topology is ideal for networks that take up relatively little space. It lacks a central hub, which increases the reliability of the network. Retransmission of information allows using any types of cables as a transmission medium.

The consistent discipline of servicing the nodes of such a network reduces its performance, and the failure of one of the nodes violates the integrity of the ring and requires special measures to preserve the information transmission path.

Bus topology- one of the simplest. It is associated with the use as a transmission medium coaxial cable... Data from the transmitting network node is distributed along the bus in both directions. Intermediate nodes do not broadcast incoming messages. Information arrives at all nodes, but only the one to which it is addressed receives the message. The service discipline is parallel.

This provides a high performance bus LAN. The network is easy to expand and configure, as well as to adapt to various systems. The bus topology network is resistant to possible malfunctions of individual nodes.

Bus topology networks are currently the most common. It should be noted that they are short and do not allow the use of different types of cable within the same network.

Star topology is based on the concept of a central node to which peripheral nodes are connected. Each peripheral node has its own separate communication line with the central node. All information is sent through a central hub that relays, switches and routes information flows online.

A star topology greatly simplifies the interaction of LAN nodes with each other, and allows the use of simpler network adapters. At the same time, the performance of a LAN with a star topology is entirely dependent on the central site.

In real computer networks more advanced topologies can be used, which in some cases represent combinations of those considered.

The choice of a particular topology is determined by the area of ​​application of the LAN, the geographic location of its nodes and the dimension of the network as a whole.

Internet- a worldwide information computer network, which is an unification of many regional computer networks and computers that exchange information with each other via public telecommunications channels (dedicated telephone analog and digital lines, optical communication channels and radio channels, including satellite communication lines).

ISP- network service provider - a person or organization that provides services for connecting to computer networks.

Host (from the English host - "host receiving guests")- any device that provides services in the "client-server" format in the server mode via any interfaces and is uniquely defined on these interfaces. In a more specific case, a host can be understood as any computer or server connected to a local or global network.

Network protocol- a set of rules and actions (sequence of actions), which allows connection and data exchange between two or more devices connected to the network.

IP-address (IP-address, abbreviation of the English Internet Protocol Address)- unique network address of the node in computer network built over IP. Globally unique addresses are required on the Internet; in the case of working in a local network, the uniqueness of the address within the network is required. In the IPv4 version, the IP address is 4 bytes long.

Domain name - a symbolic name that helps to find the addresses of Internet servers.

13) Peer-to-Peer Tasks



Did you like the article? Share it