350 rub
Journal Science Intensive Technologies №3 for 2017 г.
Article in number:
Protection information database from unauthorized access
Authors:
M.A. Rodygin - Leading Specialist, JSC «Concern «Morinsys-Agat» (Moscow) E-mail: gibbsia@mail.ru
Abstract:
Information security is defined as a system of basic ideas relating to the protection of information, giving a holistic view of nature protection problems, the laws of its development, and significant relationships with other branches of knowledge, formed and developed on the basis of the experience of practical solutions to problems of protection and defines the basic guidelines towards improving practice protection of information. Unauthorized access (unauthorized access) to a computer intruder is dangerous not only to the ability to read and / or modification of the processed electronic documents, but also the possibility of the introduction of malicious software controlled bookmarks. Protecting computers from unauthorized access is a major problem of information security, so in the majority of systems and popular software packages are built different security subsystem from unauthorized access. However, there is no doubt that for serious pro-tection from unauthorized access built-in under the system. Produced as software vendors packs and hotfixes objectively somewhat behind the information about the detected vulnerabilities. Therefore, in addition to the standard means of protection requires the use of special means of limiting or restricting access.
Pages: 32-35
References

 

  1. Miroshnik M.A. Razrabotka sredstv zashhity informacii v raspredelennykh kompjuternykh sistemakh i setjakh // Sistemy upravlenija i distancionnogo dostupa. 2015. № 1(110). S. 18−25.
  2. Nasonova V.A., Droga A.A., ZHukova P.N. O nekotorykh metodikakh zashhity baz dannykh ot vnutrennikh zloumyshlennikov // Materialy Mezhdunar. nauchno-praktich. konf. «Problemy informacionnogo obespechenija dejatelnosti pravookhranitelnykh organov». Belgorod. 2015. S. 55−62.
  3. Pashhenko I.N., Vasilev V.I., Guzairov M.B. Zashhita informacii v setjakh smart grid na osnove intellektualnykh tekhnologijj: proektirovanie bazy pravil // Izvestija JUFU. Tekhnicheskie nauki. 2015. № 5(166). S. 28−37.
  4. Utechki konfidencialnojj informacii. Itogi 2014 g. // Zashhita informacii. Insajjd. 2015. № 3(63). S. 50−55.