Заглавная страница Избранные статьи Случайная статья Познавательные статьи Новые добавления Обратная связь FAQ Написать работу КАТЕГОРИИ: АрхеологияБиология Генетика География Информатика История Логика Маркетинг Математика Менеджмент Механика Педагогика Религия Социология Технологии Физика Философия Финансы Химия Экология ТОП 10 на сайте Приготовление дезинфицирующих растворов различной концентрацииТехника нижней прямой подачи мяча. Франко-прусская война (причины и последствия) Организация работы процедурного кабинета Смысловое и механическое запоминание, их место и роль в усвоении знаний Коммуникативные барьеры и пути их преодоления Обработка изделий медицинского назначения многократного применения Образцы текста публицистического стиля Четыре типа изменения баланса Задачи с ответами для Всероссийской олимпиады по праву Мы поможем в написании ваших работ! ЗНАЕТЕ ЛИ ВЫ?
Влияние общества на человека
Приготовление дезинфицирующих растворов различной концентрации Практические работы по географии для 6 класса Организация работы процедурного кабинета Изменения в неживой природе осенью Уборка процедурного кабинета Сольфеджио. Все правила по сольфеджио Балочные системы. Определение реакций опор и моментов защемления |
The information protection in the global network INTERNETСодержание книги
Поиск на нашем сайте
The global network INTERNET takes a significant place in a modern society life. Nowadays the INTERNET covers many spheres of activities, in particular, such branches as information technologies, commercial operations, information interchange, bank business, education etc. The access of organization to the global network INTERNET essentially increases its functioning effectiveness and opens a set of new opportunities. On the other hand, the organization should provide the creation of information resources protecting system to prevent an access of unauthorized users, who may use, modify or destroy important information. Regardless of its specifics, the information protecting system for global networks is part of general security complex that directed on information safety assurance. The information protection is the complex of means directed on information safety assuring. In practice it should include maintenance of integrity, availability, confidentiality of the information and resources that used for data input, saving, processing and transfer. The complex character of this problem emphasizes that for its solution the combination of legislative, organizational and software-hardware measures should be realized. The main threats to the information safety in the INTERNET The unauthorized access (UAA) in the INTERNET can be performed, in particular, using the following actions: — penetration into network with the purpose of reading the confidential information; — penetration into network with the purpose of updating or destroying the existing information; — embedding of the programs — viruses, which will disorganize the network functions or perform the all the above mentioned actions; — destroying of the INTERN ET-servers functioning or local computers connected to the INTERNET. ЛИ these actions can be realized separately or in any combination. Let's list some examples of the unauthorized intrusions in the INTERNET: smart attacks the INTERNET-viruses, the Troyan programs that assemble the secured information from WEB-pages, destroy the servers functioning etc. The protection from unauthorized access in the INTERNET Every information protecting means is directed to the certain type of safety threats, and realizes the protection against specific types of the unauthorized access. There are program and hardware protecting tools. The software protecting tools are program complexes intended to reveal and to prevent the possible UAA threats. The examples of software protection tools are: firewalls, cryptographic program means, authenticating means, means for the vulnerable network components definition and protection. The hardware tools are the set of hardware means intended to the data enciphering and to the protection from viruses. The examples of hardware tools are: cryptographic electronic boards and hardware complexes-anti-viruses. Nowadays the simple approaches to the protection system organization are the most widespread, such as the systems for protection from the unauthorized users access. These systems are rather reliable, however they do not offer the required flexibility. They are based on the various tools for protection assurance, for example, the tools that permit the data transfer only to those users who possess the certain addresses of network protocol IP, tools that deny the direct users access to the INTERNET resources and local networks. The shortcomings of this approach consist in narrowness of the solved problem: to prevent access of the unauthorized users to the various local networks. The similar protection is used for access prevention of the certain users of the local network (for example, corporate network of the enterprise) to the all INTERNET resources, except for electronic mail. The principle of this protection method is the next: the protection of the local information and decreasing of external channels traffic. However users and providers of the INTERNET services are more concerned in maintaining of general safety of network, in particular, the confidentiality of the information of the sender and receiver, and the absolute reliance is necessary for the providers and users that on the other end of the communication channel is the legal user.
Summarize the text. Text B
|
||||
Последнее изменение этой страницы: 2016-12-10; просмотров: 820; Нарушение авторского права страницы; Мы поможем в написании вашей работы! infopedia.su Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав. Обратная связь - 18.117.183.43 (0.008 с.) |