In the modern information age, when technological progress has reached seemingly unprecedented heights, the question of information protection is acute. The basics of computer security allow you to manage this process, preventing many problems.
Why protect information? And most importantly, from what? We have to answer these questions. So, what data can be attacked and what consequences does it entail?
Nowadays, not everyone knows the basics of computer security and not everyone understands the need to use them. In addition, very little attention is paid to this issue if we compare it with the volume that we have to deal with daily. It would seem okay. Well, who needs our personal data, for example? After all, this is also a subject of protection. And remember how many times you heard about the "immaculate" loan. That is, a man lived quietly with his everyday life, did not suspect anything. Until one day I received a letter from a bank about a loan debt, which he had never seen. Here, an ordinary resident for the first time will encounter the problem of information leakage. Where did they come from, this information about his ID? One can only guess. What can I say, I did not keep track.
A separate story about organizations that contain information in their archives under the heading "Secret." State or
military secrets are carefully protected by law, but even here there are some incidents. What is only the well-known Internet resource, constantly analyzing materials "leaking" out of national control. Not only the dissemination of classified information, but also its corruption or change brings enormous problems. It should be noted that before, when the distribution of technical means was not so comprehensive, the basics of computer security were necessary primarily for the above organizations.
Internal threat
Yes, various third-party tools pose a significant danger to computer systems. Such as viruses, unauthorized access to databases. However, the so-called internal threat does much harm. For example, an employee of an organization protecting a trade secret decided to use secret data for the sake of his personal enrichment. Given the scale of the planned enterprise, this can bring significant benefits and, as a result, harm the victim of such fraud.
Protection
Legislation in this area is more developed in countries with developed computer technologies and industry. In those where they have repeatedly faced this problem and understand what consequences this may lead to. In those where the basics of computer security - not an empty phrase. Moreover, with the emergence of new types of violations, regulatory acts also develop. One of the important documents was the Law on Personal Data, which entered into force in 2006.
To summarize:
- In the world of modern achievements and technologies, the basics of information and computer security are of great importance.
- Inadequate data protection can lead to its dissemination, damage, modification or blocking access to it for the owners themselves.
- Legislation in this area is not yet sufficiently developed and does not provide for all possible options.
Over time, the need to protect information is becoming ever more acute. More and more specialists are engaged in its provision. And how many more university students study the theoretical foundations of computer security. Perhaps in the near future there will be no trace of problems with data protection.