Рrotection of information in information systems презентация

Information security of networks is a "state of security", "Information infrastructure, entities that collect, generate, disseminate and use information, as well as a system for regulating relations arising from the use

Слайд 1Рrotection of information in information systems


Слайд 2Information security of networks is a "state of security", "Information infrastructure,

entities that collect, generate, disseminate and use information, as well as a system for regulating relations arising from the use of communication networks."



Слайд 3 Due to their openness and accessibility, computer networks and public communication

networks are a convenient means for ensuring interaction between citizens, business and public authorities. However, the more open networks, the more they are vulnerable. We can distinguish a number of features that make the network vulnerable, and violators - virtually elusive:



Слайд 4the possibility of violators at a distance in combination with the

possibility of hiding their true personal data (this feature is typical, in particular, for the Internet, radio networks, cable television networks, illegal use of telephone network resources); •

the ability to propagate and disseminate network security breaches (for example, the distribution in the Internet of software that allows unauthorized access to information resources, violate copyrights, etc.);


Слайд 5• the possibility of repeated repetition of attacking network impacts (for

example, the generation in the Internet or telephone networks of call flows leading to disruption of network nodes).

Слайд 6 Defining a secure information system
Unlike local corporate networks connected to the

Internet, where conventional security solutions to a large extent solve the problems of protecting internal segments of the network from unauthorized access, distributed corporate information systems, e-commerce systems and the provision of services to Internet users have increased requirements in terms of ensuring information security.

Слайд 7The concept of "Secure Information Systems" includes a number of legislative

initiatives, scientific, technical and technological solutions, readiness of state organizations and companies to use them so that people, using devices based on computers and software, feel just as comfortable and safe. In general, we can talk about the degree of confidence, or reliability, of systems evaluated by two main criteria: the existence and completeness of the security policy and the security assurance.

Слайд 8 The existence and completeness of the security policy is a set

of external and corporate standards, rules and norms of behavior that correspond to the country's legislative acts and determine how the organization collects, processes, disseminates and protects information.

Слайд 9Security assurance is a measure of trust that can be provided

to the architecture, infrastructure, hardware and software implementation of the system and methods for managing its configuration and integrity..

Слайд 10Security assurance is a measure of trust that can be provided

by architecture, infrastructure, software and hardware implementation of systems and methods of managing its configuration and integrity. Guarantee can result from both testing and verification, and from verification (system or operational) of the overall design and execution of the system as a whole and its components. Guaranteedness shows how well the mechanisms responsible for enforcing the security policy.

Обратная связь

Если не удалось найти и скачать презентацию, Вы можете заказать его на нашем сайте. Мы постараемся найти нужный Вам материал и отправим по электронной почте. Не стесняйтесь обращаться к нам, если у вас возникли вопросы или пожелания:

Email: Нажмите что бы посмотреть 

Что такое ThePresentation.ru?

Это сайт презентаций, докладов, проектов, шаблонов в формате PowerPoint. Мы помогаем школьникам, студентам, учителям, преподавателям хранить и обмениваться учебными материалами с другими пользователями.


Для правообладателей

Яндекс.Метрика