Types of information security software presentation. Information security Methods of information protection. Protection against unauthorized access

slide 1

Completed by: student group 23 Gubanova E. Ya. Checked by: Turusinova I. P. Yoshkar-Ola, 2015

slide 2

Contents Unauthorized access Means of protection of information Biometric systems of protection Methods of protection against malware Data backup and recovery Hacking tools and protection against them Conclusion

slide 3

Unauthorized access Unauthorized access - actions that violate the established access procedure or the rules of differentiation, access to programs and data, which is received by subscribers who have not been registered and do not have the right to familiarize themselves or work with these resources. Access control is implemented to prevent unauthorized access.

slide 4

Password protection Passwords are used to protect programs and data stored on your computer from unauthorized access. The computer allows access to its resources only to those users who are registered and have entered the correct password. Each specific user may be allowed access only to certain information resources. In this case, all unauthorized access attempts can be logged.

slide 5

Password protection Password protection is used when the operating system is booted The password entry can be set in the BIOS Setup program, the computer will not boot the operating system unless the correct password is entered. It is not easy to overcome such protection. The following can be protected from unauthorized access: disks, folders, files of the local computer. Certain access rights can be set for them: full access, the ability to make changes, only read, write, etc.

slide 6

Information protection is an activity aimed at preventing information leakage, unauthorized and unintentional influences on information.

Slide 7

Slide 8

Information security tools Information security tools are a set of engineering, electronic, and other devices and devices used to solve various tasks on information protection, including prevention of leakage and ensuring the security of protected information. Information security tools are divided into: Technical (hardware) tools Software tools Organizational tools

Slide 9

Technical (hardware) means These are devices of various types, which solve the problems of information protection with hardware. They prevent physical penetration, access to information, including through its disguise. The first part of the task is solved by locks, bars on windows, security alarms, etc. The second part is noise generators, network filters, scanning radios and many other devices that “block” potential information leakage channels or allow them to be detected.

slide 10

Software tools Software tools include programs for user identification, access control, information encryption, deletion of residual information such as temporary files, test control of the protection system, etc.

slide 11

Organizational means Organizational means consist of organizational and technical (preparation of premises with computers, laying of a cable system, taking into account the requirements of restricting access to it, etc.) and organizational and legal.

slide 12

Biometric security systems Biometric identification systems are used to protect against unauthorized access to information. The characteristics used in these systems are inalienable qualities of a person's personality and therefore cannot be lost and forged. Biometric information security systems include identification systems: by fingerprints; according to the characteristics of speech; on the iris of the eye; according to the image of the face; according to the geometry of the palm of the hand.

slide 13

Fingerprint identification Optical fingerprint scanners are installed on laptops, mice, keyboards, flash drives, and also used as separate external devices and terminals (for example, in airports and banks). If the fingerprint pattern does not match the pattern of the user admitted to the information, then access to the information is impossible.

slide 14

Identification by speech characteristics Identification of a person by voice is one of the traditional methods of recognition, interest in this method is also associated with forecasts for the introduction of voice interfaces into operating systems. Voice identification is contactless and there are systems for restricting access to information based on frequency analysis of speech.

slide 15

Iris identification To identify the iris, special scanners connected to a computer are used. The iris of the eye is a unique biometric characteristic for each person. The eye image is extracted from the face image and a special barcode mask is superimposed on it. The result is a matrix, individual for each person.

slide 16

Facial Identification Facial recognition technologies are often used to identify a person. Recognition of a person occurs at a distance. Identification features take into account the shape of the face, its color, as well as the color of the hair. Important features include also the coordinates of facial points in places corresponding to a change in contrast (eyebrows, eyes, nose, ears, mouth and oval). Currently, the issuance of new international passports begins, in the microchip of which a digital photograph of the owner is stored.

slide 17

Identification by the palm of the hand In biometrics, for identification purposes, the simple geometry of the hand is used - the size and shape, as well as some information signs on the back of the hand (images on the folds between the phalanges of the fingers, patterns of the location of blood vessels). Fingerprint identification scanners are installed at some airports, banks and nuclear power plants.

slide 18

Other methods of identification using habitoscopy (3D face image) - Nvisage - developed by Cambridge Neurodynamics EyeDentify's ICAM 2001 device - measures the properties of the retina - eSign - program for digital signature identification identification by the structure and relative position of the blood vessels of the hand integrated system"One-on-one Facial Recognition"

slide 19

Digital (electronic) signature eSign is a signature identification program that uses a special digital pen and an electronic notepad to register a signature. During the registration process, eSign remembers not only the image of the signature itself, but also the dynamics of the movement of the pen. eSign analyzes a number of parameters, including the general features of a particular person's handwriting.

slide 20

A malicious program is a malicious program, that is, a program created with malicious intent or malicious intent. Antiviruses are used to protect against malware. The reason for the penetration of viruses on computers protected by an antivirus can be: the antivirus was disabled by the user; anti-virus databases were too old; weak protection settings were set; the virus used infection technology against which the antivirus had no means of protection; the virus entered the computer before the antivirus was installed, and was able to neutralize the antivirus tool; it was a new virus for which anti-virus databases have not yet been released Anti-malware methods

slide 21

Antivirus programs Modern antivirus programs provide comprehensive protection programs and data on the computer from all types of malicious programs and methods of their penetration into the computer: Internet, local network, e-mail, removable storage media. The principle of operation of anti-virus programs is based on checking files, boot sectors of disks and random access memory and search for known and new malware in them.

slide 22

Anti-virus programs The anti-virus monitor starts automatically when the operating system starts. Its main task is to provide maximum protection against malware with minimal slowdown of the computer. The anti-virus scanner is launched according to a pre-selected schedule or at any time by the user. The anti-virus scanner searches for malware in the RAM, as well as on the hard and network drives of the computer.

slide 23

Data backup and recovery Backup is the process of creating a copy of data on a medium designed to restore data to its original or new location in case of damage or destruction. Data recovery is the procedure for extracting information from a storage device when it cannot be read in the usual way.

slide 24

Hacker tools and protection against them Network attacks on remote servers are implemented using special programs that send numerous requests to them. This causes the server to freeze if the resources of the attacked server are insufficient to process all incoming requests. Some hacking tools implement fatal network attacks. Such utilities use vulnerabilities in operating systems and applications and send specially crafted requests to attacked computers on the network. As a result, a special kind of network request causes a critical error in the attacked application, and the system stops working. Protection against hacker attacks of network worms and Trojans Protection of computer networks or individual computers from unauthorized access can be carried out using a firewall. The firewall allows you to: block hacker DoS attacks by preventing network packets from certain servers from passing to the protected computer prevent network worms from penetrating the protected computer prevent Trojan programs from sending confidential information about the user and the computer.

slide 28

Types and methods of information protection From deliberate distortion, vandalism (computer viruses) General Methods information protection; preventive measures; use of anti-virus programs From unauthorized (illegal) access to information (its use, modification, distribution) Encryption; password protection; "electronic locks"; set of administrative and law enforcement measures Type of protection Method of protection

slide 29

I would like to hope that the system of information protection being created in the country and the formation of a set of measures for its implementation will not lead to irreversible consequences on the path of information and intellectual integration with the whole world that is emerging in Russia. Conclusion Information today is expensive and must be protected. The mass use of personal computers, unfortunately, turned out to be associated with the emergence of self-reproducing virus programs that prevent the normal operation of the computer, destroy the file structure of disks and damage the information stored in the computer.

1 slide

Modern ways and means of information protection Completed by: student of group T3-09 Alexander Apetov 2012

2 slide

Information security is a set of organizational, technical and technological measures to protect information from unauthorized access, destruction, modification, disclosure and delays in access.

3 slide

Information Security gives a guarantee that the following goals are achieved: confidentiality of information (property of information resources, including information related to the fact that they will not become available and will not be disclosed to unauthorized persons); the integrity of information and related processes (the immutability of information in the process of its transmission or storage); availability of information when it is needed (property of information resources, including information, which determines the possibility of their receipt and use at the request of authorized persons); accounting for all processes related to information.

4 slide

Information security consists of three components: Confidentiality, Integrity, Availability. The points of application of the information security process to the information system are: hardware, software, communication (communications). The procedures (mechanisms) of protection themselves are divided into protection of the physical level, protection of personnel, organizational level. Communications Hardware Software

5 slide

Security threat computer system is a potential incident (whether intentional or not) that could have an undesirable effect on the system itself, as well as on the information stored in it. An analysis of threats conducted by the agency by the National Computer Security Association in the United States revealed the following statistics:

6 slide

7 slide

A security policy is a set of measures and active actions to manage and improve security systems and technologies.

8 slide

Organizational protection organization of the regime and protection. organization of work with employees (selection and placement of personnel, including familiarization with employees, their study, training in the rules for working with confidential information, familiarization with the measures of responsibility for violation of information protection rules, etc.) organization of work with documents and documented information (development, use, accounting, execution, return, storage and destruction of documents and carriers of confidential information) organization of the use of technical means for collecting, processing, accumulating and storing confidential information; organization of work on the analysis of internal and external threats to confidential information and the development of measures to ensure its protection; organization of work on carrying out systematic control over the work of personnel with confidential information, the procedure for accounting, storage and destruction of documents and technical media.

9 slide

Technical means information protection To protect the perimeter of the information system, the following are created: security and fire alarm systems; digital video surveillance systems; access control and management systems (ACS). The protection of information from its leakage by technical communication channels is ensured by the following means and measures: the use of a shielded cable and the laying of wires and cables in shielded structures; installation of high-frequency filters on communication lines; construction of shielded rooms (“capsules”); use of shielded equipment; installation of active noise systems; creation of controlled zones.

10 slide

Information security hardware Special registers for storing security details: passwords, identification codes, vultures or secrecy levels; Devices for measuring individual characteristics of a person (voice, fingerprints) in order to identify him; Schemes for interrupting the transmission of information in the communication line in order to periodically check the address of data output. Devices for encrypting information (cryptographic methods). Uninterruptible power systems: Uninterruptible power supplies; Load redundancy; Voltage generators.

11 slide

Information security software Means of protection against unauthorized access (UAS): Means of authorization; Mandatory access control; Selective access control; Role based access control; Journaling (also called Audit). Analysis and simulation systems information flows(CASE systems). Network Monitoring Systems: Intrusion Detection and Prevention Systems (IDS/IPS). Confidential Information Leak Prevention Systems (DLP-systems). protocol analyzers. Antivirus tools.

12 slide

Information security software Firewalls. Cryptographic means: Encryption; Digital signature. Backup systems. Authentication systems: Password; Access key (physical or electronic); Certificate; Biometrics. Tools for analysis of protection systems: Monitoring software product.

13 slide

TYPES OF ANTI-VIRUS PROGRAMS Detectors allow you to detect files infected with one of several known viruses. Some detector programs also perform heuristic analysis of files and disk system areas, which often (but by no means always) allows you to detect new viruses that are not known to the detector program. Filters are resident programs that notify the user of all attempts by a program to write to a disk, let alone format it, as well as other suspicious actions. Doctor programs or phages not only find virus-infected files, but also “cure” them, i.e. the body of the virus program is removed from the file, returning the files to their original state. Auditors remember information about the state of files and system areas of disks, and at subsequent launches they compare their state with the original one. If inconsistencies are found, the user is informed about this. Watchmen or filters are located resident in the computer's RAM and check for viruses executable files and inserted USB drives. Vaccine programs or immunizers modify programs and disks in such a way that this does not affect the operation of programs, but the virus against which vaccination is performed considers these programs or disks already infected.

14 slide

Disadvantages of anti-virus programs None of the existing anti-virus technologies can provide complete protection against viruses. The anti-virus program takes away part of the computing resources of the system, loading the central processor and hard drive. This can be especially noticeable on weak computers. Antivirus programs can see a threat where there is none (false positives). Antivirus programs download updates from the Internet, thereby consuming bandwidth. Various methods of encryption and packaging of malware make even known viruses undetectable by antivirus software. Detection of these "masked" viruses requires a powerful decompression engine that can decrypt files before they are scanned. However, many anti-virus programs do not have this feature and, therefore, it is often impossible to detect encrypted viruses.

15 slide

Understanding a computer virus A computer virus is a special program, causing deliberate harm to the computer on which it is launched for execution, or to other computers on the network. The main function of the virus is its reproduction.

16 slide

Classification of computer viruses by habitat; by operating systems; according to the algorithm of work; destructive potential.

PROTECTION INFORMATION


Data protection

is a set of measures aimed at ensuring information security.


Why is there a need to protect information

The problem of protecting information from unauthorized access has become especially acute with the widespread use of local and, especially, global computer networks.

Often the damage is caused due to elementary user errors that accidentally corrupt or delete vital data.


Why protect information?

Information circulating in control and communication systems can cause large-scale accidents, military conflicts, disruption of the activities of scientific centers and laboratories, bankruptcies and commercial organizations. Therefore, information must be able to be protected from distortion, loss, leakage, illegal use.


Type of protection

Protection methods

From hardware failures

From accidental loss or distortion of information stored in the computer

  • A request to confirm the execution of commands that modify files (for example, when replacing a file);

From computer viruses

Setting special attributes of documents and programs (read-only, hidden);

  • Archiving and backing up files
  • Preventive measures to reduce the likelihood of infection;

From unauthorized access to information (its use, modification, distribution)

Ability to undo an incorrect action or restore an erroneously deleted file;

Use of antivirus programs.

Encryption;

Differentiation of user access to PC resources.

Password protection;

" electronic locks " ;

administrative and law enforcement measures.


Automatic file backup

When using automatic backup programs, the command to save the file is automatically duplicated and the file is saved on two independent media, for example, on two hard drives. Failure of one of them does not lead to loss of information.

File backup is widely used, in particular in banking.



Types of computer crimes

  • Unauthorized access to information,
  • Entering logic bombs,
  • Development and distribution of viruses,
  • Criminal negligence in development,
  • Fake computer information
  • Theft of computer information.

Measures preventing computer crimes

  • Technical
  • Organizational
  • Legal

The protection of information in computers should be considered as a set of measures, including organizational, technical, legal, software, operational, insurance, and even moral and ethical measures.


Technical measures

Protection against unauthorized access to the system

Redundancy of Critical Computer Subsystems

Organization of computer networks

Installation of fire fighting equipment

Equipped with locks, alarms.


Organizational arrangements

  • computer center security
  • careful selection of staff
  • availability of a recovery plan (after a failure),
  • universality of means of protection from all users.

Legal measures

  • Development of norms establishing responsibility for computer crimes;
  • Copyright protection of programmers;
  • Improvement of criminal and civil legislation.

"Legislation in the field of information"

10 basic laws, in which:

  • the basic terms and concepts are defined,
  • regulates the dissemination of information,
  • copyright protection,
  • property and non-property relations.

Article 273 of the Criminal Code of the Russian Federation

  • Provides for criminal liability for the creation of computer programs or their modification, leading to unauthorized destruction.
  • Protects the rights of the owner.
  • Criminal liability resulting from the creation of the program.
  • To attract, the mere fact of creating programs is sufficient.

Legal protection of information is regulated by the laws of the Russian Federation

The legal protection provided by this law extends to all types of computer programs that can be expressed in any language and in any form, including source text in a programming language and machine code. But legal protection does not extend to the ideas and principles underlying the computer program, including the ideas and principles of interface and algorithm organization.


To notify of his rights, the developer of the program may, starting from the first release of the program, use a copyright sign consisting of 3 elements:

  • letters C in a circle or parentheses ©; title (name) of the right holder; year of the program's first release.
  • letters C in a circle or parentheses ©;
  • title (name) of the right holder;
  • year of the program's first release.

© 1993-1997 Microsoft Corporation.


An organization or a user who legally owns a copy of the program (who has purchased a license to use it) has the right, without obtaining additional permission from the developer, to carry out any actions related to the operation of the program, including its recording and storage in the computer memory. Recording and storage in the computer memory is allowed in relation to one computer or one user in the network, unless otherwise provided by the contract with the developer.

You must know and comply with existing laws that prohibit illegal copying and use of licensed software. In relation to organizations or users that infringe copyright, the developer may seek damages and compensation from the infringer in an amount determined at the discretion of the court from 5,000 times to 50,000 times the minimum monthly wage.


Digital signature

In 2002, the Law of the Russian Federation "On digital signature", which became the legislative basis electronic document management in Russia. According to this law, an electronic digital signature in electronic document is recognized as legally equivalent to a signature in a paper document.

When registering a digital signature in specialized centers, the correspondent receives two keys: secret and public. The secret key is stored on a floppy disk or smart card and should be known only to the correspondent himself. The public key must be held by all potential recipients of documents and is usually distributed via e-mail.

The process of electronic signing of a document consists in processing the text of the message using a secret key. Next, the encrypted message is sent by e-mail to the subscriber. The subscriber uses the public key to authenticate the message and the electronic signature.


The computer air defense system of the North American continent once declared a false nuclear alarm, putting the armed forces on alert. And the cause was a defective 46-cent chip - a small, coin-sized silicon element.


Examples of errors when working with information

In 1983, a flood occurred in the southwestern United States. The cause was a computer that was entered with incorrect weather data, as a result of which it gave an erroneous signal to the locks blocking the Colorado River.


Examples of errors when working with information

In 1971, 352 cars disappeared from the New York Railroad. The criminal took advantage of the information of the computer center that manages the work railway, and changed the destination addresses of the wagons. The damage caused amounted to more than a million dollars.


Incorrect work of users and maintenance personnel

80-90% of information security threats large companies comes from the "internal enemy" - careless users who can, for example, download a file with a virus from the network.


Technical failures of equipment

Cabling Disruption Prevention

Power failure protection

Disk Failure Prevention


Unauthorized access from outside

« Hacker" - this is English word, which denotes an individual who takes pleasure in learning the details of the functioning of computer systems and in expanding the capabilities of these systems (as opposed to most users who prefer to know only the necessary minimum).

information security professionals

hackers (

crackers


The main task of a hacker is to investigate the protection, find weaknesses in the security system and inform users and developers about them in order to eliminate the vulnerabilities found and increase the level of protection.

Crackers carry out "hacking" of the system in order to obtain unauthorized access to information resources and systems closed to them.


Crackers

vandals

penetration into the system with the aim of its complete destruction

jokers

notoriety gained by infiltrating the system

crackers

hacking the system in order to gain profit by stealing or replacing information

Internet information protection

If a computer is connected to the Internet, then in principle any user also connected to the Internet can access the information resources of this computer. If the server has an Internet connection and simultaneously serves as a local network server (Intranet server), then unauthorized access from the Internet to the local network is possible.

The mechanisms for penetration from the Internet to a local computer and to a local network can be different:

  • Web pages loaded into the browser may contain active ActiveX controls or Java applets that can perform destructive actions on the local computer;
  • some Web servers place text cookies on the local computer that can be used to obtain confidential information about the user of the local computer;
  • using special utilities, you can access disks and files on the local computer, etc.

To prevent this from happening, a software or hardware barrier is installed between the Internet and the Intranet using firewall(firewall - firewall). The firewall monitors the transfer of data between networks, monitors current connections, detects suspicious activity and thereby prevents unauthorized access from the Internet to the local network.


Firewall

firewall (firewall) is a software and/or hardware barrier between two networks that allows only authorized connections to be established.

The firewall protects a local area network connected to the Internet or a separate personal computer from outside penetration and excludes the possibility of access to confidential information.


Protection of programs from illegal copying and use

Computer pirates, illegally replicating software, devalue the work of programmers, make software development an economically unprofitable business. In addition, software pirates often offer users unfinished programs, programs with errors, or their demo versions.

For computer software to function, it must be installed (installed). The software is distributed by manufacturers in the form of distribution kits on CD-ROM. Each distribution has its own serial number, which prevents illegal copying and installation of programs.


To prevent illegal copying of programs and data stored on the CD-ROM, special protection. The CD-ROM may contain an encrypted software key, which is lost during copying and without which the program cannot be installed.

Protection against illegal use of programs can be implemented using a hardware key, which is usually attached to the computer's parallel port. The protected application accesses the parallel port and requests a secret code; if the hardware key is not connected to the computer, the protected application determines the situation of protection violation and stops its execution.


  • Berne Convention for the Protection of Literary and Artistic Works 1886
  • World Copyright Convention 1952

  • Constitution Russian Federation Art. 44.
  • Civil Code of the Russian Federation.
  • Copyright and Related Rights Act 1993
  • Law of the Russian Federation "On legal protection computer programs and databases" 1992.

  • Latin letter C inside a circle ©,
  • The name of the owner of the exclusive copyright,
  • Date of first publication.

© 1993-1997 Microsoft Corporation


  • copyright,
  • Right to a name
  • The right to publish
  • The right to protect reputation.

If programs are created in order of execution official duties or on the instructions of the employer, they belong to the employer, unless otherwise provided in the contract between him and the author.

Extract from the Criminal Code of the Russian Federation

Chapter 28. Crimes in the field of computer information

Article 272. Illegal access to computer information.

1. Illegal access to computer information protected by law, that is, information on a machine carrier, in an electronic computer (ECM), if this act caused the destruction, blocking, modification or copying of information, disruption of the computer, - shall be punished

  • a fine in the amount of two hundred to five hundred times the minimum wage
  • or in size wages or other income of the convicted person for a period of two to five months,
  • or correctional labor for a term of six months to one year,
  • or imprisonment for up to two years.

2. The same action committed by a group of persons by prior agreement or by an organized group, or by a person using his official position, as well as having access to a computer, a computer system or their network, is punishable by a fine in the amount of one hundred thousand to three hundred thousand rubles or amount of wages or other income of the convicted person for a period of one to two years, or by compulsory labor for a term of one hundred and eighty to two hundred and forty hours, or by corrective labor for a term of up to two years, or by arrest for a term of three to six months, or by deprivation freedom for up to five years.


Article 273. Creation, use and distribution of malicious programs for computers

Creating computer programs or making changes to existing programs that knowingly lead to unauthorized destruction, blocking, modification or copying of information, disruption of the computer, as well as the use or distribution of such programs or machine media with such programs, is punishable.

  • imprisonment for up to three years with a fine in the amount of two hundred to five hundred times the minimum wage
  • or in the amount of wages or other income of the convicted person for a period of two to five months. The same acts that caused grave consequences - are punishable by imprisonment for a term of three to seven years.

Article 274

1. Violation of the rules for the operation of a computer by a person who has access to a computer, resulting in the destruction, blocking or modification of computer information protected by law, if this act caused significant harm, shall be punished

  • deprivation of the right to hold certain positions or engage in certain activities for up to five years,
  • or compulsory works for a period of one hundred and eighty to two hundred and forty hours,
  • or restraint of liberty for up to two years.

2. The same act, negligently entailing grave consequences, is punishable by deprivation of liberty for a term of up to four years.


  • By fingerprints
  • According to the characteristics of speech
  • According to the geometry of the palms of the hands,
  • By face,
  • On the iris of the eye.

INFORMATION PROTECTION

It was announced in 1988 by the Association computer equipment to once again remind all users of the need to maintain the protection of their computers and the information stored on them.

In that year, the Morris worm attacked computers for the first time, as a result of which 6,000 nodes of the Internet's predecessor, the ARPANET, were infected. This attack caused $96 million in damages. The author of this virus might not have been found, but Robert Morris, a graduate student at Cornell University, was forced to confess by his own father. Morris received 3 years of probation and 400 hours of community service. In addition, he paid a $10,500 fine. Since it was the first mass epidemic to hit computers in 1988, experts began to seriously think about integrated approach to ensuring the security of information resources.


What is the best way to choose components for a password?

  • Do not use a password that is a dictionary word.
  • If possible, punctuation marks can be used.
  • You can use lowercase and uppercase characters, as well as numbers from 0 to 9.
  • The optimal number for compiling a password is the number of digits (letters) from 8 to 10.
  • Use the last characters from a list of numbers, characters, or the alphabet.
  • Beware of interceptor programs.

“If you don’t report the data within a week, you will be blocked”

"If you want to protect yourself from phishing, follow this link and enter your username and password"

Phishing is a type of Internet fraud, the purpose of which is to obtain identified user data.


  • How can I fix my copyright on a software product?
  • Why is software piracy damaging to society?
  • What are the software and hardware ways to protect information?

SECURITY The security of an information system is a property that consists in the ability of the system to ensure its normal functioning, that is, to ensure the integrity and secrecy of information. To ensure the integrity and confidentiality of information, it is necessary to protect information from accidental destruction or unauthorized access to it.


THREATS There are many possible directions of information leakage and ways of unauthorized access to it in systems and networks: information interception; modification of information (the original message or document is changed or replaced by another and sent to the addressee); substitution of authorship of information (someone can send a letter or document on your behalf); use of shortcomings of operating systems and application software; copying media and files with overcoming protection measures; illegal connection to equipment and communication lines; masking as a registered user and assigning his authority; introduction of new users; the introduction of computer viruses and so on.


PROTECTION Means of protection of IS information from the actions of subjects include: means of protecting information from unauthorized access; information protection in computer networks; cryptographic protection of information; electronic digital signature; protecting information from computer viruses.


UNAUTHORIZED ACCESS Obtaining access to information system resources involves the implementation of three procedures: identification, authentication and authorization. Identification - assignment to the user (object or subject of resources) of unique names and codes (identifiers). Authentication - Establishing the identity of the user who provided the identifier, or verifying that the person or device that provided the identifier is really who he claims to be. The most common authentication method is to give the user a password and store it on the computer. Authorization - checking the authority or checking the user's right to access specific resources and perform certain operations on them. Authorization is carried out in order to differentiate access rights to network and computer resources.


COMPUTER NETWORKS Local networks of enterprises are very often connected to the Internet. To protect local area networks of companies, as a rule, firewalls are used - firewalls (firewalls). Screen (firewall) is a means of access control that allows you to divide the network into two parts (the border runs between local network and the Internet) and form a set of rules that determine the conditions for passing packets from one part to another. Screens can be implemented both in hardware and software.


CRYPTOGRAPHY Encryption or cryptography is used to ensure the secrecy of information. For encryption, an algorithm or a device that implements a certain algorithm is used. Encryption is controlled by a changing key code. The encrypted information can only be retrieved using the key. Cryptography is very effective method, which improves the security of data transmission in computer networks and when exchanging information between remote computers.


ELECTRONIC DIGITAL SIGNATURE electronic signature. An electronic digital signature is a sequence of characters obtained as a result of cryptographic transformation of the original message using a private key and allowing to determine the integrity of the message and its authorship using public key. In other words, a message encrypted with a private key is called an electronic digital signature. The sender sends an unencrypted message in its original form along with a digital signature. The recipient, using the public key, decrypts the character set of the message from the digital signature and compares it with the character set of the unencrypted message. With a complete match of characters, it can be argued that the received message is not modified and belongs to its author.


ANTI-VIRUS A computer virus is a small malicious program that can independently create copies of itself and inject them into programs (executable files), documents, boot sectors of data carriers and spread through communication channels. Depending on the habitat, the main types of computer viruses are: Software viruses (which infect files with the extension .COM and .EXE) Boot viruses. Macroviruses. network viruses. Sources of virus infection can be removable media and telecommunications systems. The most effective and popular anti-virus programs include: Kaspersky Anti-Virus 7.0, AVAST, Norton AntiVirus and many others.


SITES USED informacii-v-komp-yuternyh-setyah.html informacii-v-komp-yuternyh-setyah.html html ht ml ht ml

Presentation on the topic: Modern methods and means of information security























1 of 22

Presentation on the topic: Modern methods and means of information protection

slide number 1

Description of the slide:

slide number 2

Description of the slide:

slide number 3

Description of the slide:

Information security provides a guarantee that the following goals are achieved: confidentiality of information (property of information resources, including information related to the fact that they will not become available and will not be disclosed to unauthorized persons); the integrity of information and related processes (the immutability of information in the process of its transmission or storage); availability of information when it is needed (property of information resources, including information, which determines the possibility of their receipt and use at the request of authorized persons); accounting for all processes related to information.

slide number 4

Description of the slide:

Information security consists of three components: Confidentiality, Integrity, Availability. The points of application of the information security process to the information system are: hardware, software, communication (communications). The procedures (mechanisms) of protection themselves are divided into protection of the physical level, protection of personnel, organizational level.

slide number 5

Description of the slide:

A security threat to a computer system is a potential occurrence (whether intentional or not) that may have an undesirable effect on the system itself, as well as on the information stored in it. An analysis of threats conducted by the agency by the National Computer Security Association in the United States revealed the following statistics:

slide number 6

Description of the slide:

slide number 7

Description of the slide:

slide number 8

Description of the slide:

organization of regime and protection. organization of work with employees (selection and placement of personnel, including familiarization with employees, their study, training in the rules for working with confidential information, familiarization with the measures of responsibility for violation of information protection rules, etc.) organization of work with documents and documented information (development, use, accounting, execution, return, storage and destruction of documents and carriers of confidential information) organization of the use of technical means for collecting, processing, accumulating and storing confidential information; organization of work on the analysis of internal and external threats to confidential information and the development of measures to ensure its protection; organization of work on carrying out systematic control over the work of personnel with confidential information, the procedure for accounting, storage and destruction of documents and technical media.

slide number 9

Description of the slide:

Technical means of information protection To protect the perimeter of the information system, the following are created: security and fire alarm systems; digital video surveillance systems; access control and management systems (ACS). The protection of information from its leakage by technical communication channels is ensured by the following means and measures: the use of a shielded cable and the laying of wires and cables in shielded structures; installation of high-frequency filters on communication lines; construction of shielded rooms (“capsules”); use of shielded equipment; installation of active noise systems; creation of controlled zones.

slide number 10

Description of the slide:

Information security hardware Special registers for storing security details: passwords, identification codes, vultures or secrecy levels; Devices for measuring individual characteristics of a person (voice, fingerprints) in order to identify him; Schemes for interrupting the transmission of information in the communication line in order to periodically check the address of data output. Devices for encrypting information (cryptographic methods). Uninterruptible power systems: Uninterruptible power supplies; Load redundancy; Voltage generators.

slide number 11

Description of the slide:

Information security software Means of protection against unauthorized access (UAS): Means of authorization; Mandatory access control; Selective access control; Role based access control; Journaling (also called Audit). Systems for analysis and modeling of information flows (CASE-systems). Network Monitoring Systems: Intrusion Detection and Prevention Systems (IDS/IPS). Confidential Information Leak Prevention Systems (DLP-systems). protocol analyzers. Antivirus tools.

slide number 12

Description of the slide:

Information security software Firewalls. Cryptographic means: Encryption; Digital signature. Backup systems. Authentication systems: Password; Access key (physical or electronic); Certificate; Biometrics. Tools for analysis of protection systems: Monitoring software product.

slide number 13

Description of the slide:

Detectors allow you to detect files infected with one of several known viruses. Some detector programs also perform heuristic analysis of files and disk system areas, which often (but by no means always) allows you to detect new viruses that are not known to the detector program. Filters are resident programs that notify the user of all attempts by a program to write to a disk, let alone format it, as well as other suspicious actions. Doctor programs or phages not only find virus-infected files, but also “cure” them, i.e. the body of the virus program is removed from the file, returning the files to their original state. Auditors remember information about the state of files and system areas of disks, and at subsequent launches they compare their state with the original one. If inconsistencies are found, the user is informed about this. Watchmen or filters are located resident in the computer's RAM and check for viruses executable files and inserted USB drives. Vaccine programs or immunizers modify programs and disks in such a way that this does not affect the operation of programs, but the virus against which vaccination is performed considers these programs or disks already infected.

slide number 14

Description of the slide:

Disadvantages of anti-virus programs None of the existing anti-virus technologies can provide complete protection against viruses. The anti-virus program takes away part of the computing resources of the system, loading the central processor and hard drive. This can be especially noticeable on weak computers. Antivirus programs can see a threat where there is none (false positives). Antivirus programs download updates from the Internet, thereby consuming bandwidth. Various methods of malware encryption and packaging make even known viruses undetectable by antivirus software. Detection of these "masked" viruses requires a powerful decompression engine that can decrypt files before they are scanned. However, many anti-virus programs do not have this feature and, therefore, it is often impossible to detect encrypted viruses.

Description of the slide:

slide number 19

Description of the slide:

3) According to the operation algorithm Residency Viruses that have this property act constantly while the computer is on. Self-encryption and polymorphism Polymorphic viruses change their code or program body in such a way that they are difficult to detect. Stealth algorithm Invisible viruses "hide" in RAM and the anti-virus program cannot detect them. Unconventional techniques Fundamentally new methods of virus impact on a computer.

Description of the slide:

A Trojan horse is a program that contains some destructive function that is activated when a certain trigger condition occurs. Usually such programs are disguised as some useful utilities. Types of destructive actions: Destruction of information. (The specific choice of objects and methods of destruction depends only on the imagination of the author of such a program and the capabilities of the OS. This function is common to Trojan horses and bookmarks). Interception and transmission of information. (passwords typed on the keyboard). Purposeful change of the program. Worms are viruses that spread over global networks, infecting entire systems, not individual programs. This is the most dangerous type of virus, as the objects of attack in this case are Information Systems state scale. With the advent of the global Internet networks this type of security breach poses the greatest threat because any of the computers connected to this network can be exposed to it at any time. The main function of viruses of this type is to hack the attacked system, i.e. breaching security to compromise security and integrity.

slide number 22

Description of the slide:

identification is the naming of oneself by a person to the system; authentication is the establishment of correspondence of a person to an identifier named by him; authorization - providing this person with opportunities in accordance with their rights or checking for rights when trying to perform some action




Top