Technical methods of information protection occupy one of the most important places in the implementation of security policies in any organization or significant object. These tools are used to search for information theft technology, which is sometimes installed at the facility, to isolate rooms during negotiations or some important meetings, to protect communications and equipment used to process information.
Technical means of information security: equipment selection
Issues related to the selection of equipment designed to protect your organization must be approached with particular care. When choosing radio interference generators, noise suppressors, telephone line protection devices, and other equipment, you should take into account a sufficient amount of factors that are decisive: their strengths and weaknesses, mutual influence on each other, as well as a host of other factors. Using special materials, you can not only get acquainted with the spectrum of action of such equipment, but also decide on the final choice.
Information security equipment: premises
To protect the premises, various types of acoustic and vibro-acoustic noise are very actively used. Their main purpose is to protect speech information that can circulate indoors, from listening using different types of stethoscopes, acoustic microphones, infrared and laser information theft systems. These systems work by creating a masking of the speech spectrum by means of broadband unfiltered acoustic noise in ventilation, heating, water supply systems, as well as in building envelopes.
Technical means of information security: telephone lines
Telephone communication lines are considered to be the most likely methods of information leakage. Most of the devices for active protection of telephone lines are designed to neutralize listening and sound recording equipment that is connected between the station and the subscriber unit. Protection is implemented by generating high-frequency and low-frequency interference into the telephone line, regulating the electric current consumption in the line during a conversation, which causes a decrease in the signal quality at the input of the listening equipment, and also blocks the acoustic start-up of recording equipment. If radio transmitting devices are used, then a channel frequency shift or a blur of the transmission spectrum also occurs.
Technical means of information security: electronic systems
Modern business is not able to exist without the use of large amounts of information involving the use of electronic processing systems that create spurious electromagnetic radiation. Using specialized technical means, it is quite possible to intercept them outside the controlled area, and then completely restore the information. In addition to such emissions near existing electronic devices, there is always a quasistatic information electric and magnetic field, which rapidly decreases with distance, however, they require pickup on circuits that are located quite close. Such fields are significant at frequencies from tens of kilo- to tens of megahertz. In this case, information interception becomes possible when receiving equipment is directly connected to these communications outside the protected area. To prevent information leakage through such channels, noise generators are used , which are engaged in the production of active masking of secondary electromagnetic radiation.
As you can see, at the moment there are quite effective ways and means of protecting information that can be used in modern companies.