Conceptual model of choice of hardware and software protection
( Pp. 63-71)
More about authors
Maliy Julia V.
kandidat ekonomicheskih nauk; docent kafedry organizacii i tehnologii zaschity informacii
Belgorod University of Cooperation, Economics and Law Prokushev Yaroslav E.
Plekhanov Russian University of Economics
Moscow, Russian Federation
Belgorod University of Cooperation, Economics and Law Prokushev Yaroslav E.
Plekhanov Russian University of Economics
Moscow, Russian Federation
Abstract:
The need to protect information in organizations of any level is absolutely obvious today. The development of new information technologies and universal computerization have led to the fact that information protection and information security become one of the main tasks of the organization and characteristics of the information system. With the development and complexity of technical means, methods and forms of automation of information processing processes, the vulnerability of information protection increases. The main factors contributing to this are: high growth in the volume of processed information using various automation tools; expansion of the circle of users who have direct access to the resources of the computer system and the data stored in it; complication of the modes of operation of technical means [Schneier, 2003].Software and hardware protection measures are based on the use of modern technical electronic devices and special programs that are part of the organization’s automated system and are performed independently or in conjunction with other security features [Schneier, 2003; Mitnick, Simon, 2005; Konheim, 2007].This article deals with the problem of choosing information security tools when developing an information security system and the formulated model can be used in most systems of hardware and software protection of information in a local computer system.The comparative analysis reveals some significant operational features from the authors point of view of the two information security systems, each of which has its own strengths and, if applied correctly, can provide a high level of information security.
How to Cite:
Maliy J.V., Prokushev Y.E., (2020), CONCEPTUAL MODEL OF CHOICE OF HARDWARE AND SOFTWARE PROTECTION. Computational Nanotechnology, 1 => 63-71.
Reference list:
Prikaz № 21 Ob utverzhdenii sostava i soderzhaniya organizatsionnykh i tekhnicheskikh mer po obespecheniyu bezopasnosti personal nykh dannykh pri ikh obrabotke v informatsionnykh sistemakh personal nykh dannykh . Utv. FSTEK Rossii 18.02.2013.
Prikaz № 17 Ob utverzhdenii trebovaniy o zashchite informatsii, ne sostavlyayushchey gosudarstvennuyu taynu, soderzhashcheysya v gosudarstvennykh informatsionnykh sistemakh . Utv. FSTEK Rossii 11.02.2013.
Metodicheskie rekomendatsii po vypolneniyu zakonodatel nykh trebovaniy pri obrabotke personal nykh dannykh v organizatsiyakh bankovskoy sistemy Rossiyskoy Federatsii (utv. Bankom Rossii, ARB, Assotsiatsiey regional nykh bankov Rossii (Assotsiatsiya Rossiya ).
GOST R 51624-2000 Zashchita informatsii. Avtomatizirovannye sistemy v zashchishchennom ispolnenii. Obshchie trebovaniya .
Prokushev YA.E. Programmno-apparatnye sredstva zashchity informatsii. Sredstva antivirusnoy zashchity: ucheb. posobie. Belgorod: Izd-vo BUKEP, 2014. 110 s.
Maliy YU.V., SHatokhin R.A., Prokushev YA.E. Aktual nye problemy obespecheniya informatsionnoy bezopasnosti v bankovskoy sfere: monografiya. Belgorod: Izd-vo BUKEP, 2018. 185 s.
Schneier B. Beyond fear: Thinking sensibly about security in an uncertain world. 2003. P. 263.
Mitnick K., Simon W.L. The art of deception: Controlling the human element of security. 2003. P. 330.
Mitnick K., Simon W.L. The art of intrusion. 2005. P. 288.
Konheim A.G. Computer security and cryptography. USA: Wiley, 2007. P. 544.
Prikaz № 17 Ob utverzhdenii trebovaniy o zashchite informatsii, ne sostavlyayushchey gosudarstvennuyu taynu, soderzhashcheysya v gosudarstvennykh informatsionnykh sistemakh . Utv. FSTEK Rossii 11.02.2013.
Metodicheskie rekomendatsii po vypolneniyu zakonodatel nykh trebovaniy pri obrabotke personal nykh dannykh v organizatsiyakh bankovskoy sistemy Rossiyskoy Federatsii (utv. Bankom Rossii, ARB, Assotsiatsiey regional nykh bankov Rossii (Assotsiatsiya Rossiya ).
GOST R 51624-2000 Zashchita informatsii. Avtomatizirovannye sistemy v zashchishchennom ispolnenii. Obshchie trebovaniya .
Prokushev YA.E. Programmno-apparatnye sredstva zashchity informatsii. Sredstva antivirusnoy zashchity: ucheb. posobie. Belgorod: Izd-vo BUKEP, 2014. 110 s.
Maliy YU.V., SHatokhin R.A., Prokushev YA.E. Aktual nye problemy obespecheniya informatsionnoy bezopasnosti v bankovskoy sfere: monografiya. Belgorod: Izd-vo BUKEP, 2018. 185 s.
Schneier B. Beyond fear: Thinking sensibly about security in an uncertain world. 2003. P. 263.
Mitnick K., Simon W.L. The art of deception: Controlling the human element of security. 2003. P. 330.
Mitnick K., Simon W.L. The art of intrusion. 2005. P. 288.
Konheim A.G. Computer security and cryptography. USA: Wiley, 2007. P. 544.
Keywords:
information security, security tools, information security, hardware and software protection.
Related Articles
Computer Science Pages: 11-16 DOI: 10.33693/2313-223X-2025-12-1-11-16 Issue №188734
Implementation of Secure Traffic Light Management Using a Neuromorphic Computing Base Based on Fuzzy Graphs
information security
neuromorphic computing
neuromorphic controller
intelligent controller
fuzzy graphs
Show more
Multiscale Modeling for Information Control and Processing Pages: 11-20 DOI: 10.33693/2313-223X-2022-9-1-11-20 Issue №20643
A Refined Method for Analytical Modeling of the Processes of Spreading Virus Software to Assess the Security of Informatization Objects
virus software
Information system
Information Security
security threat modeling
information security risk assessment
Show more
Public Law Pages: 16-20 DOI: 10.33693/2782-7372-2023-2-2-16-20 Issue №23134
Integrated Approach of Personnel Training for Cybersecurity: Challenges and Problems
digital economy
information law
intellectual property
information security
information warfare
Show more
Pages: 16-20 DOI: 10.33693/2782-7372-2023-2-2-16-20 Issue №
Integrated Approach of Personnel Training for Cybersecurity: Challenges and Problems
digital economy
information law
intellectual property
information security
information warfare
Show more
Multiscale modeling for information control and processing Pages: 26-37 DOI: 10.33693/2313-223X-2021-8-1-26-37 Issue №18588
The modeling of information security system design processes in state information systems
modeling of information security processes
information security
information security management
graphical modeling
methodology of functional graphical modeling
Show more
Mathematical Modeling, Numerical Methods and Complex Programs Pages: 25-34 DOI: 10.33693/2313-223X-2024-11-4-25-34 Issue №173588
Using Graphs to Identify Asset Security Compromises
company assets
data loss
information security
risk assessment
threats
Show more
Information Security Pages: 23-38 DOI: 10.33693/2313-223X-2023-10-4-23-38 Issue №47939
The Modeling of Processes of Design of Information Protection Systems in Financial Information Systems
modeling of information security processes
information security
information security management
graphical modeling
methodology of functional graphical modeling
Show more
Information Security Pages: 45-55 DOI: 10.33693/2313-223X-2022-9-2-45-55 Issue №21224
The Modeling of Processes of Design of Information Protection Systems in Critical Information Infrastructures
modeling of information security processes
information security
information security management
graphical modeling
methodology of functional graphical modeling
Show more
Political Institutions, Processes and Technologies Pages: 49-54 DOI: 10.33693/2223-0092-2025-15-2-49-54 Issue №195081
Dynamics of Information Support for National and Military Security of Turkey at the Present Stage
Turkey
national security
military security
information security
foreign policy
Show more
1. NATIONAL ECONOMY AND MANAGEMENT 08.00.05 Pages: 41-45 Issue №19821
Prospects for the Development of Industry 4.0 in the Context of Digitalization of the Russian Economy
digital economy
Industry 4.0
cybersecurity
digital technologies
data protection
Show more