Information Technology Reference
In-Depth Information
The problem of information security is many-sided and consists of many aspects, but
in this report I would like to talk on only one of the major issues - the security of the
State information resources in information and telecommunication systems
.
All information and telecommunication systems in Ukraine can be attributed to two
categories by the criterion of access to information, which is transferred, processed or
retained as follows::
x special information and telecommunication systems and networks of
communication intended for information interchange with limited access
x information and telecommunication systems and networks of general purpose
including, for example, the Internet
The basic parameter of efficiency of protection systems of information in information
and telecommunication systems is the ability to provide integrity, accessibility and
confidentiality of their information resources.
2.
DEFINITION
Confidentiality of information is security of information from non-authorized
knowledge, copying or divulgence.
Integrity of information is security of information from the non-authorized
modification, removal and/or addition of separate parts.
Accessibility of information is the possibility of authorized access to information in a
set time interval with a set degree of quality of service.
These parameters of integrity and accessibility are as a rule applied to general purpose
systems and networks. Concerning special information and telecommunication systems
and networks, in addition to parameters of integrity and accessibility; there are also
demands on maintenance of a necessary level of confidentiality of their information
resources.
Accordingly, with the purpose of achieving the necessary levels of a technical means
of protection of information, which will allow the control of integrity, protection against
non-authorized access, the analysis and reproduction of events, technologies of hacking
and electronic-digital signature, obligatory organizational actions should also be applied.
The maintenance of confidentiality in special networks systems of protection should
include a means of cryptographic protection of the information which can provide
enciphering of corresponding information resources and/or traffic. It is necessary to note,
that for special networks, all means of technical and cryptographic protection of
information applied to achievement of the necessary levels of integrity, accessibility and
confidentiality, should necessarily pass the procedure of State expert appraisal on
conformity to the requirements of national standards in the field of protection of
information.
According to the national legislation of Ukraine, the creation of systems of protection
in information and telecommunication systems and networks must be carried out
irrespective of the category to which they belong (either for special or general purpose).
In this case, only parameters and levels of security, which need to be realized in the
protection system, may differ.
It is my opinion that the uniform complex approach and the uniform methodology of
decisions on problems of maintenance of protection of State information resources in
Search WWH ::




Custom Search