The ubiquity of computing raises completely new questions for modern users that no one has ever encountered before. In particular, it is necessary to know how to protect information presented in digital form. The need for this is determined by the use of computers not only as local computing stations, but also as constituent nodes of global networks. For example, information protection methods for a computer not connected to a network worry its owner to a much lesser extent than when connecting several computers to a common network. Obviously, in the second case, security is lower. Although this introduces certain differences in the methods of protecting information, the old scheme is still relevant, in which data security is based on three basic components: hardware, software, and communication. By the way, the latter is true both for living people (communication) and for inter-computer exchange of data packets.
Software methods for protecting information are quite simple - a system of access control based on passwords, lists of allowed users (IP addresses and other identifiers), anti-virus applications, information encoding, etc. For the end user, interacting with data protected by these types of security systems is most understandable and convenient, but their effectiveness should always be maintained at the proper level. The level of protection implemented by software, despite their apparent perfection, is incomplete. It is enough to familiarize yourself with the huge list of updates that must be constantly installed to maintain protection up to date. The disadvantage of this approach to solving the problem is the complexity of the software, which is already not overly simple. In addition, in some cases, it may slow down the work with protected data.
Software data protection is conventionally divided into:
- prevention of unauthorized access ;
- blocking copy functions;
- backup of important data;
- analysis of the level of protection;
- restriction of the capabilities of the user-visitor.
Hardware information security implements a completely different approach to the issue. The obvious advantages are speed and high reliability. For example, you can enter a list of users who are allowed access to the filtering gateway device. Also, special hardware electronic keys are increasingly being used, only with which it is possible to work with protected information. In addition to suppressing intentional unauthorized access, hardware often offers protection against inadvertent actions that threaten data security. For example, if you have the necessary elements of the system, it is possible to use automatic backup of the specified data. Power outages, which pose a direct threat to the safety of information, are easily leveled by the inclusion of emergency sources, etc. Although the hardware seems no less reliable than the software, some features do not allow creating an absolutely reliable protection system only with their help.
The most promising option is integrated information protection, combining both software and hardware information security . It is often impossible to indicate which class a particular defense mechanism belongs to. So, scanning devices that correctly identify the user cannot work without support from the software, however, in fact, they are hardware. The password-based identification system is also increasingly using a solution that, in addition to direct password entry, requires sending a confirmation code from any device.
It is recommended to use complex solutions as more efficient, universal and flexible in setting.