Saturday, October 31, 2015

Random Words Assosiation

Brain

Neurons

Web

Connection

Functionality

Processor

RAM

Computer

Internet

Server

Information


Important files

Threat

Hacker

Protection

Software

Anti-Virus

Firewall






Sunday, October 18, 2015

Essay.

Informational problems











   When we talk about the means that carries a tons of information, the lion's share of which is marked as "private" we are faced with such a problem that causes the effects that can cause both miserable and global damages. This problem is called "information leak." Therefore, mankind came up with the idea of ​​a some kind of structure that would partially or completely be able to resolve this issue. The name of this structure is information security or security of information and data.
    Information security  - the state of protection of information (data), which is provided at its (their) confidentiality, availability and integrity. Information security - protection of the confidentiality, integrity and availability of information. As the human factors, in which private information is transmitted in some cases, in the World Wide Web main problems of protection of information in computer systems arise from the fact that the information is not exactly bound to the person or organisation. It can be easily and quickly copied and transmitted over communication channels. The information system is exposed to both external and internal threats by violators.
Let's talk about methods of protection in the WWW. Methods of information security in an organization are:
Obstacle - method of a creating physical barriers to an attacker from protected information (alarms, locks, etc.).
Access control - a method of protection of the information associated with the regulation of the use of all resources information system. Access control includes the following security features:
identification of personnel and resources of information system;
authentication according to the presented identifier (name). As a rule, such tools include passwords;
authorization check - user authentication;
Masking - a method of protecting data in the information system of the organization by its cryptographic closure.
Regulation - a method of information protection, creating certain conditions of automated processing, storage and transmission of information, in which the possibility of unauthorized access to it (the attack) would be reduced to a minimum.
Coercion - a method of protection in which the users of the system have to comply with rules for processing, transmission and use of protected information under the threat of physical, administrative and criminal liability.
Motivation - a method of protecting information that motivates employees not to violate the rules at the expense of compliance with the prevailing moral and ethical standards.



Brain mind map


WWW mind map