Conceptual model of choice of hardware and software protection
( Pp. 63-71)

More about authors
Maliy Julia V. kandidat ekonomicheskih nauk; docent kafedry organizacii i tehnologii zaschity informacii
Belgorod University of Cooperation, Economics and Law Prokushev Yaroslav E. Cand. Sci. (Econ.), Associate Professor; associate professor at the Department of Applied Information Technology and Information Security
Plekhanov Russian University of Economics
Moscow, Russian Federation
For read the full article, please, register or log in
Abstract:
The need to protect information in organizations of any level is absolutely obvious today. The development of new information technologies and universal computerization have led to the fact that information protection and information security become one of the main tasks of the organization and characteristics of the information system. With the development and complexity of technical means, methods and forms of automation of information processing processes, the vulnerability of information protection increases. The main factors contributing to this are: high growth in the volume of processed information using various automation tools; expansion of the circle of users who have direct access to the resources of the computer system and the data stored in it; complication of the modes of operation of technical means [Schneier, 2003].Software and hardware protection measures are based on the use of modern technical electronic devices and special programs that are part of the organization’s automated system and are performed independently or in conjunction with other security features [Schneier, 2003; Mitnick, Simon, 2005; Konheim, 2007].This article deals with the problem of choosing information security tools when developing an information security system and the formulated model can be used in most systems of hardware and software protection of information in a local computer system.The comparative analysis reveals some significant operational features from the authors point of view of the two information security systems, each of which has its own strengths and, if applied correctly, can provide a high level of information security.
How to Cite:
Maliy J.V., Prokushev Y.E., (2020), CONCEPTUAL MODEL OF CHOICE OF HARDWARE AND SOFTWARE PROTECTION. Computational Nanotechnology, 1 => 63-71. DOI: 10.33693/2313-223X-2020-7-1-63-71
Reference list:
Prikaz № 21 Ob utverzhdenii sostava i soderzhaniya organizatsionnykh i tekhnicheskikh mer po obespecheniyu bezopasnosti personal nykh dannykh pri ikh obrabotke v informatsionnykh sistemakh personal nykh dannykh . Utv. FSTEK Rossii 18.02.2013.
Prikaz № 17 Ob utverzhdenii trebovaniy o zashchite informatsii, ne sostavlyayushchey gosudarstvennuyu taynu, soderzhashcheysya v gosudarstvennykh informatsionnykh sistemakh . Utv. FSTEK Rossii 11.02.2013.
Metodicheskie rekomendatsii po vypolneniyu zakonodatel nykh trebovaniy pri obrabotke personal nykh dannykh v organizatsiyakh bankovskoy sistemy Rossiyskoy Federatsii (utv. Bankom Rossii, ARB, Assotsiatsiey regional nykh bankov Rossii (Assotsiatsiya Rossiya ).
GOST R 51624-2000 Zashchita informatsii. Avtomatizirovannye sistemy v zashchishchennom ispolnenii. Obshchie trebovaniya .
Prokushev YA.E. Programmno-apparatnye sredstva zashchity informatsii. Sredstva antivirusnoy zashchity: ucheb. posobie. Belgorod: Izd-vo BUKEP, 2014. 110 s.
Maliy YU.V., SHatokhin R.A., Prokushev YA.E. Aktual nye problemy obespecheniya informatsionnoy bezopasnosti v bankovskoy sfere: monografiya. Belgorod: Izd-vo BUKEP, 2018. 185 s.
Schneier B. Beyond fear: Thinking sensibly about security in an uncertain world. 2003. P. 263.
Mitnick K., Simon W.L. The art of deception: Controlling the human element of security. 2003. P. 330.
Mitnick K., Simon W.L. The art of intrusion. 2005. P. 288.
Konheim A.G. Computer security and cryptography. USA: Wiley, 2007. P. 544.
Keywords:
information security, security tools, information security, hardware and software protection.


Related Articles

11. Criminal law and criminology; Criminal enforcement law Pages: 187-189 Issue №14823
CHILD CONSERVATION AND INFORMATION SECURITY OF CHILDREN
child saving threats information security child legal basis
Show more
8. Judicial, prosecutorial, human rights and law enforcement activities Pages: 158-162 Issue №6252
INFORMATION SECURITY OF ADVOCATE’S ACTIVITY: THE MAIN NOTIONS
lawyer advocacy information information security information security activities of a lawyer
Show more
7. Criminal law, Criminal enforcement law, Criminology Pages: 159-162 Issue №4088
THE USE OF TECHNICAL DEVICES AND INFORMATION TECHNOLOGIES FOR CRIMINAL PURPOSES AS A CIRCUMSTANCE AGGRAVATING THE CRIMINAL LIABILITY
information security crimes cynicism social danger computer
Show more
8. INFORMATION LAW (12.00.13) Pages: 197-201 Issue №17728
Information terrorism is a threat to national security in the context of digitalization
information terrorism national security information security cybercrime government regulation
Show more
12. CRIME IN THE FIELD OF INFORMATION TECHNOLOGY AND CYBER CRIME Pages: 146-148 Issue №10327
ABOUT SOME METHODS OF INFORMATION SECURITY IN THE WORLD WIDE WEB
information security the threat of information national security the global information space the Internet
Show more
9. Administrative law; Administrative process, Information Law Pages: 116-120 Issue №5518
THE MODEL OF LEGAL REGULATION OF THE ACTIVITY OF MASS MEDIA IN THE СONTEXT OF INFORMATIONAL SECURITY
Legal model the mechanism of legal regulation subsystem system communication Media
Show more
4. CRIMINAL - LEGAL, CRIMINOLOGICAL, ADMINISTRATIVE AND OTHER MEASURES FOR COUNTERING CRIME IN CONTEMPORARY CONDITIONS Pages: 166-170 Issue №19590
Information Support of Services and Units of the MIA of Russia as an Aspect of Effectiveness of Countering Crime
information resource data banks crime prevention operational environment categorized machine-readable medium
Show more
2. SCIENTIFIC SCHOOL OF DOCTOR OF SCIENCE, PROFESSOR ShHAGAPSOEV Z.L. Pages: 139-141 Issue №7907
INFORMATIONAL TERRORISM AS THE RUSSIAN FEDERATION NATIONAL SECURITY THREAT
information terrorism the threat of information national security information security the global information space
Show more
12. OTHER Pages: 197-200 Issue №10472
Due diligence: problems of optimization and application of the legal framework
linguistic security information security a multiethnic region comprehensive examination extremist texts
Show more
12. MISCELLANIOUS Pages: 251-257 Issue №17728
Digital trust environment concept
digital economy digital trust environment information security
Show more