Computational nanotechnology
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
General information
Latest issue
Archive

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



Comp. nanotechnol.:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


Computational nanotechnology, 2020, Volume 7, Issue 1, Pages 63–71
DOI: https://doi.org/10.33693/2313-223X-2020-7-1-63-71
(Mi cn289)
 

05.13.00 INFORMATICS, COMPUTER FACILITIES AND MANAGEMENT
05.13.19 INFORMATION SECURITY

Conceptual model of choice of hardware and software protection

Ya. E. Prokusheva, J. V. Maliyb

a Plekhanov Russian University of Economics
b Belgorod University of Cooperation, Economics and Law
Abstract: The need to protect information in organizations of any level is absolutely obvious today. The development of new information technologies and universal computerization have led to the fact that information protection and information security become one of the main tasks of the organization and characteristics of the information system.
With the development and complexity of technical means, methods and forms of automation of information processing processes, the vulnerability of information protection increases. The main factors contributing to this are: high growth in the volume of processed information using various automation tools; expansion of the circle of users who have direct access to the resources of the computer system and the data stored in it; complication of the modes of operation of technical means [Schneier, 2003].
Software and hardware protection measures are based on the use of modern technical electronic devices and special programs that are part of the organization's automated system and are performed independently or in conjunction with other security features [Schneier, 2003; Mitnick, Simon, 2005; Konheim, 2007].This article deals with the problem of choosing information security tools when developing an information security system and the formulated model can be used in most systems of hardware and software protection of information in a local computer system.
The comparative analysis reveals some significant operational features from the authors point of view of the two information security systems, each of which has its own strengths and, if applied correctly, can provide a high level of information security.
Keywords: information security, security tools, information security, hardware and software protection.
Received: 11.03.2020
Document Type: Article
Language: Russian
Citation: Ya. E. Prokushev, J. V. Maliy, “Conceptual model of choice of hardware and software protection”, Comp. nanotechnol., 7:1 (2020), 63–71
Citation in format AMSBIB
\Bibitem{ProMal20}
\by Ya.~E.~Prokushev, J.~V.~Maliy
\paper Conceptual model of choice of hardware and software protection
\jour Comp. nanotechnol.
\yr 2020
\vol 7
\issue 1
\pages 63--71
\mathnet{http://mi.mathnet.ru/cn289}
\crossref{https://doi.org/10.33693/2313-223X-2020-7-1-63-71}
Linking options:
  • https://www.mathnet.ru/eng/cn289
  • https://www.mathnet.ru/eng/cn/v7/i1/p63
  • Citing articles in Google Scholar: Russian citations, English citations
    Related articles in Google Scholar: Russian articles, English articles
    Computational nanotechnology
    Statistics & downloads:
    Abstract page:167
    Full-text PDF :69
    References:1
     
      Contact us:
     Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2024