Threats to Information Security

In the courtyard of the twenty-first century, machines have successfully replaced obsolete accounts, office ledgers and, to some extent, even books. It is somehow not even solid to store information on a paper sheet, because almost every house has a personal computer. But the more data is transferred to digital media, the more acute are the threats to information security. So, the problem of protecting data from threats threatening them requires constant attention. In order for tactics in data protection to be most effective, an analysis of all possible threats that could potentially damage protected information is needed.

The classification of information security threats contains two main types: artificial and natural threats.

The latter include those types of threats that can cause damage without human influence. Among them are floods, lightning, hurricanes, fires and so on. Among the natural causes, the main threats to information security come from fires. Fire detectors, monitoring of compliance with fire safety techniques, the availability of fire extinguishing equipment in the premises where the servers and archives are located are important elements of the struggle for data security.

If the building in which the protected information is located is located near a large body of water, the likelihood of flooding should be considered. In this case, it is better to place data archives on the last floors.

A very serious threat to the integrity of materials can be thunderstorms with lots of lightning. Close and powerful discharges are quite capable of destroying computer equipment, and this is not only the machines themselves, but also the various network infrastructure. In order to minimize such losses, shielding and grounding of network cables connecting the equipment are used. It is also highly desirable for the same purpose to provide all the computing equipment with uninterruptible power supply units.

If you constantly monitor compliance with all of the above items, threats to information security from natural causes will be minimal.

But there is another type of threat - artificial, they are divided into intentional and unintentional.

If a threat to the information security of the enterprise is caused by the curiosity of the staff, or the problems began due to the indiscretion of the responsible persons, this situation is considered unintentional. This happens, for example, when an employee voluntarily installs a program downloaded from unreliable sources onto a working computer. As a rule, inexperienced users rarely understand what such forbidden activity can lead to. If such a program caused an unstable operation of the system or data loss, then they say that the data security was violated for artificial and unintended reasons.

If the actions aimed at creating a threat to information security were carried out deliberately, in order to bring the system out of operation, such a threat is considered deliberate, it is divided into external and internal. It would be naive to think that large losses are possible only when attacking hackers from the outside. The actions of an employee introduced by a competing company, or dissatisfied with his salary, can cause no less, or even more harm.

Systems connected to the Internet to protect against hacker attacks should be equipped with a software or hardware firewall .

If you value your information and do not want to lose it because of threats that could have been foreseen in advance, be sure to follow the rules listed.

Source: https://habr.com/ru/post/C7539/


All Articles