Methods of protection of information in computer technology

ubiquity of computer technology to the modern user raises entirely new questions that no one had ever come across.In particular, it is necessary to know how to protect information provided in digital form.The need for this is due not only to the use of computers as a local computer stations, but also as constituent units WANs.For example, methods of information protection is not connected to the computer concerned for its owner to a much lesser extent than when connecting several computers in a common network.Obviously, in the latter case security below.While this introduces some differences in how to protect the information still relevant old scheme in which data security is based on three basic components: hardware, software and communications.Incidentally, the latter is true for people living (communication) and to-computer exchange of data packets.

software security information are pretty simple - a system of access control based on passwords, lists of authorized users (IP addresses and other identifiers), antivirus software, coding information, and others. For the end-user interaction with data protected by these kinds of security systems, the mostunderstandable and user-friendly, but their effectiveness should always be maintained at the proper level.The level of protection implemented in software, despite their seeming perfection is incomplete.It is enough to get acquainted with the huge list of updates that should be installed to maintain constant protection up to date.The disadvantage of this approach to the problem - a complication of software that already does not differ excessive simplicity.Furthermore, in some cases it is possible to slow down data being protected.

Software Data Protection conditionally divided into:

- prevention of unauthorized access;

- lock copy functions;

- backup important data;

- analysis of the level of protection;

- limitation of opportunities user-visitor.

Hardware data protection implement a completely different approach to the issue.The obvious advantages are speed and reliability.For example, Subject to a list of users who are allowed to access the device is filtered in the gateway.It is also increasingly used special hardware dongles, only with the help of which can work with protected information.In addition to suppression of intentional unauthorized access, hardware often offer protection against unintentional actions that threaten the safety of the data.For example, if the necessary elements of the system, transforming the automatic backup of these data.Interruptions in power supply, carrying a direct threat to the safety of the information is easily offset by the inclusion of emergency power and so forth. Although the hardware provided not less reliable than the software, some features not only allow using them to create an absolutely reliable system of protection.

most promising option is a comprehensive data protection, combining both software and hardware information security.Often it is impossible to specify which class it is one or the other protective gear.For example, scanners, correctly identifying the user can not operate without the support of software, however, are essentially hardware.The system of identification based on passwords are also increasingly using a solution which, in addition to direct water password required to send a verification code to any device.

it is recommended to use integrated solutions, as a more efficient, versatile and flexible to set up.