Research of methods of protection of confidential data
Автор: Golovacheva Natalia A., Karpov Nikita P.
Журнал: НБИ технологии @nbi-technologies
Рубрика: Инновации в информатике, вычислительной технике и управлении
Статья в выпуске: 4 т.16, 2022 года.
Бесплатный доступ
The article analyzes the main methods of protecting confidential information. Organizationalandtechnicalmeasures to protect it areconsidered. Criteria for anadequateassessment of methods for protecting confidential data are highlighted. Within the framework of experimental studies, the best method of protecting confidential data has been identified. Currently, much attention is paidtotheprotection of confidential information- that is, informationthat a limitednumber ofpeople have the right to access. This may be personal data of citizens or secrets of commercial activity of firms, official and state secrets, or materials of legal proceedings. As a result of the leakage of secret information, there is a loss of customers, a decrease in income, etc. Attackers can seize valuable information, damage the reputation of citizens, gain access to bank accounts, private and state secret documents. To ensure the protection of confidential information, not only the development of separate mechanisms and methods of protection is required, but a whole systematic approach is needed - a set of measures, such as the use of software and hardware, engineering and cryptographic tools; legal and organizational measures. The complex nature of protection arises from the complex actions of intruders who seek to obtain important information for them by any means. Among the methods of preserving confidential data, the most common are: data certification, licensing, categorization, certification. Disclosure of confidential information is one of the main security threats. The implementation of threats is the result of one of the actions and events: disclosure of confidential information, leakage of confidential information and unauthorized access to protected information. In case of disclosure or leakage, the confidentiality of restricted access information is violated.
Information security, information protection, threat to information security, personal data, confidential information, unauthorized access, cryptographic information protection
Короткий адрес: https://sciup.org/149142125
IDR: 149142125 | DOI: 10.15688/NBIT.jvolsu.2022.4.3