The concept and types of information threats. Information Security System

In a modern society of information technology and the storage of large databases on electronic media, the issues of ensuring the security of information and types of information threats are not without idleness. Accidental and deliberate acts of natural or artificial origin that could harm the owner or user of the information is the topic of this article.

Information Security Principles

The main principles of information security, the system for ensuring its safety and integrity are:

  • Integrity of information data. This principle implies that information preserves the content and structure during its transmission and storage. The right to create, modify or destroy data is reserved only for users with the corresponding access status.
  • Data confidentiality. It is understood that access to the data array has a clearly limited circle of users authorized in this system, thereby providing protection against unauthorized access to information.
  • Availability of data array. In accordance with this principle, authorized users receive timely and unhindered access to it.
  • The accuracy of the information. This principle is expressed in the fact that information strictly belongs only to the subject from whom it is received and which is its source.
types of information threats

Security Tasks

Information security issues come to the fore in the event that irregularities and errors in the computer system can lead to serious consequences. And the tasks of an information security system include multifaceted and comprehensive measures. These include the prevention of misuse, damage, corruption, copying and blocking of information. This includes tracking and preventing unauthorized access of persons without the proper level of authorization, preventing leakage of information and all possible threats to its integrity and confidentiality. With the modern development of databases, security issues are becoming important not only for small and private users, but also for financial institutions and large corporations.

Classification of types of information security threats

By โ€œthreatโ€ in this context we mean potential actions, phenomena and processes that can lead to undesirable consequences or impacts on the operating system or on the information stored in it. In the modern world, a fairly large number of such information threats are known, the types of which are classified on the basis of one of the criteria.

So, by the nature of the occurrence, there are:

  • Natural threats. These are those that have arisen due to physical influences or natural phenomena.
  • Artificial threats. This type of information threat includes everything that is associated with human actions.

In accordance with the degree of intentionality, threats are divided into random and deliberate.

Depending on the direct source of the information security threat, there may be natural (for example, natural disasters), human (violation of the confidentiality of information by its disclosure), hardware and software. The latter type, in turn, can be divided into authorized (errors in the operation of operating systems) and unauthorized (hacking a site and virus infection) threats.

Classification by source distance

Depending on the position of the source, there are 3 main types of information threats:

  • Threats from a source outside the computer operating system. For example, the interception of information at the time of transmission through communication channels.
  • Threats, the source of which is within the control of the operating system. For example, data theft or information leakage.
  • Threats arising within the system itself. For example, incorrect transfer or copying of a resource.
information leak

Other classifications

Regardless of the remoteness of the source, the type of information threat can be passive (the impact does not entail changes in the data structure) and active (the impact changes the data structure, the content of the computer system).

In addition, information threats can appear at the stages of access to a computer and appear after authorized access (for example, unauthorized use of data).

According to the location in the system, the types of information threats can be of 3 types: those that arise at the stage of access to information located on external memory devices, in main memory and in the one that circulates through communication lines.

Some threats (for example, information theft) are not dependent on system activity, others (viruses) are detected exclusively during data processing.

unauthorized access protection

Unintentional (natural) threats

The mechanisms for implementing this type of information threat have been studied quite well, as are the methods for preventing them.

Of particular danger to computer systems are accidents and natural (natural) phenomena. As a result of such an impact, information (in whole or in part) becomes inaccessible, it can be distorted or completely destroyed. An information security system cannot completely eliminate or prevent such threats.

Another danger is the mistakes made in the development of a computer system. For example, incorrect operation algorithms, incorrect software. It is such errors that are often used by attackers.

Another type of unintended, but significant types of threats to information security is incompetence, carelessness or inattention of users. In 65% of cases of weakening the information security of systems, it is precisely violations of functional responsibilities by users that led to loss, violation of confidentiality and integrity of information.

main types of information threats

Intentional Information Threats

This type of threat is characterized by a dynamic nature and the constant replenishment of new types and methods of targeted actions by violators.

In this area, attackers use special programs:

  • Viruses are small programs that are independently copied and distributed in the system.
  • Worms - utilities that are activated every time the computer boots. Like viruses, they are copied and independently spread in the system, which leads to its overload and blocking of work.
  • Trojan horses are malicious programs hidden under useful applications. It is they who can send information files to an attacker and destroy system software.

But malware is not the only tool for deliberate intrusion. Numerous espionage methods are also used - wiretapping, theft of programs and security attributes, hacking and theft of documents. Interception of passwords is most often performed using special programs.

computer viruses and antivirus

Industrial espionage

Statistics from the FBI and the Institute for Computer Protection (USA) indicate that 50% of intrusions are carried out by employees of companies or enterprises. In addition to them, competing companies, creditors, buying companies and seller companies, as well as criminal elements, become the subjects of such information threats.

Of particular concern are hackers and techno-rats. These are qualified users and programmers who hack sites and computer networks for profit or out of sports interest.

information security system

How to protect information?

Despite the constant growth and dynamic development of various types of information threats, there are still methods of protection.

  • Physical protection is the first step in information security. This includes access restriction for unauthorized users and a bandwidth system, especially for access to the server department.
  • The basic level of information protection is programs that block computer viruses and anti-virus programs, systems for filtering correspondence of dubious nature.
  • Protection against DDoS attacks offered by software developers.
  • Creating backups stored on other external media or in the so-called โ€œcloudโ€.
  • Emergency and data recovery plan. This method is important for large companies that want to protect themselves and reduce downtime in the event of a failure.
  • Data encryption when transferring them using electronic media.

Information security requires an integrated approach. And the more methods are used, the more effective will be the protection against unauthorized access, threats of destruction or corruption of data, as well as their theft.

hacking site

Some facts that make you think

In 2016, DDoS attacks were recorded in 26% of banks.

One of the largest personal data leaks occurred in July 2017 at Equifax (USA) credit bureau. The data of 143 million people and 209 thousand credit card numbers fell into the hands of attackers.

"Who owns the information - that owns the world." This statement has not lost its relevance, especially when it comes to competition. So, in 2010, the presentation of iPhone 4 was disrupted due to the fact that one of the employees forgot the prototype of the smartphone in the bar, and the student who found it sold the prototype to reporters. As a result of this, an exclusive review of the smartphone was released in the media a few months before its official presentation.

Source: https://habr.com/ru/post/C21540/


All Articles