Главная / Каталог

Protection of Information (Защита Информации)

Файл : BIBLIOGRAPHY.doc (размер : 19,456 байт)


V.V. Domarev. Protection of Information and Computer Systems Security. Kiev: Diasoft, 1999

V.E. Figurnov. IBM PC for Users. Moscow: INFRA●M, 1996

B.I. Chernov. Computer Systems. Moscow: Prosveshenie, 1991

Файл : OUTLINE.doc (размер : 19,968 байт)




Protection of Information


state informational sources

citizen information (personal information)

development and producing of information systems

owner of information systems

copyrights and property rights

Computer systems and protection of information

problem of information protection

legal aspects


Computer crimes



“hackers” and “crackers”


Файл : PROJECT.doc (размер : 33,792 байт)



Rapid development of automation processes and the penetration of the computers in all fields of life have lead to appearance of a range of peculiar problems. One of these problems is the necessity of providing effective protection to information and means of its processing.

A lot of ways to access information, considerable quantity of qualified specialists, vast use of special technical equipment in social production make it possible for violators practically at any moment and in any place carry out the actions, which represent a threat to information safety.

Particular role in this process has been played by appearance of personal computer (PC), which has made computers, software and other informational technologies available to general public. Wide distribution of PC and impossibility of conducting effective control of their use have resulted in the decreasing security level of information systems.

In the current situation, data processing has moved the problems of information security forward to the rank of most important problems of national economy. Solving the problem of poor information security presupposes a complex of measures. First of all, such actions of government as development of classification system, documentation of information and protection methods, data access regulations and punishing measures against information security violators.



a. State informational sources

Formation of state informational sources is carried out by citizens, state authorities, organizations and social unions. Documents, which belong to a person, can be included in the state structure of informational sources, of course, if the person wishes. State informational sources are open and generally available. Documented information with limited access is divided into state secret and confidential information.

b. Citizen information (personal information)

Personal data refers to confidential information. The collection, storage, use and distribution of private information are not allowed. The information, which breaks personal and family secret, secret of correspondence, telephone, postal, telegraph talks and other messages of a person without his/her permission, is also confidential.

Personal data may not be used with purpose of causing damage to person’s property and reputation, difficulties of realization its right. Collected data must be limited to necessary information. The information, which carries strong probability of causing damage to a citizen’s interests shouldn’t be collected.

There are some categories of personal information:

secret documents;

official department rules and instructions;

information, which is not to be made public in accordance with legislative acts;

confidential business information;

information, which touches private life of a person;

information of financial institutions;

c. Development and production of informational systems

All types of informational systems and networks, technologies and means of their providing compose a special branch of economic activity, whose development is defined by the state scientific, technological and industrial policy of informatization.