Essays /

Protection Information One Internet Security Topics Essay

Essay preview

Outline

I.Introduction

II.Protection of Information

1.Information

a.state informational sources

b.citizen information (personal information)

c.development and producing of information systems

owner of information systems

copyrights and property rights

2.Computer systems and protection of information

a.problem of information protection

b.legal aspects

c.purposes

3.Computer crimes

a.definition

b.statistics

c."hackers" and "crackers"

III.Conclusion

PROTECTION OF INFORMATION

INTRODUCTION

Rapid development of automation processes and the penetration of the computers in all fields of life have lead to appearance of a range of peculiar problems. One of these problems is the necessity of providing effective protection to information and means of its processing.

A lot of ways to access information, considerable quantity of qualified specialists, vast use of special technical equipment in social production make it possible for violators practically at any moment and in any place carry out the actions, which represent a threat to information safety.

Particular role in this process has been played by appearance of personal computer (PC), which has made computers, software and other informational technologies available to general public. Wide distribution of PC and impossibility of conducting effective control of their use have resulted in the decreasing security level of information systems.

In the current situation, data processing has moved the problems of information security forward to the rank of most important problems of national economy. Solving the problem of poor information security presupposes a complex of measures. First of all, such actions of government as development of classification system, documentation of information and protection methods, data access regulations and punishing measures against information security violators.

PROTECTION OF INFORMATION

Information

a. State informational sources

Formation of state informational sources is carried out by citizens, state authorities, organizations and social unions. Documents, which belong to a person, can be included in the state structure of informational sources, of course, if the person wishes. State informational sources are open and generally available. Documented information with limited access is divided into st...

Read more

Keywords

1.information 17 2.computer 20 25 29 3 3.computer 36 4 40 63 70s 8 a.definition a.problem a.state abus access accord act action activ actual admit advis alarm allow also among analysi appar appear appropri ask aspect attent author autom avail b b.citizen b.legal b.statistics becom belong branch break broken busi c c.development c.purposes call cannot care carri categori caus center certif challeng chang charact citizen classif clear client collar collect colleg collus commerci commit compani complet complex compos comput concern conclus condit conduct confidenti connect consequ consid consider constitut control copi copyright corpor correspond counterfeit cours cracker creat crime crimin current custom damag danger data databas decreas defin definit delet depart design destroy detect determin develop didnt differ difficulti direct disciplin discuss distort distribut divid document doesn dont doubt due earli econom economi effect electron employ employe engag enjoy enrich envisag equal equip espionag essay establish everi examin expert extern extort fact famili field figur file financi find first fix follow form format forward fulfil general get gift given goal goe good got govern gradual great group hacker harm help hered high high-qual his/her home howev hurt i.introduction ii.protection iii.conclusion ill ill-intent illeg impli import imposs includ increas indirect individu industri inform informat institut instruct insur intellectu intend intent interest interf intern internet introduct job jurid knowledg lack law law-commit lead leak legal legisl level licens license life limit lost lot low machin made main maintain make manag mani manipul massif may mean measur medium messag method mis moment motiv move must nation necess necessari need neighbor network new non non-jurid non-stat norm number object obtain offici often one open opportun order organ other outlin owner page particular pass past pay pc peculiar penetr peopl permiss person personnel place play polici poor possess possibl postal power practic presuppos prevent prioriti privat probabl problem process produc product program programm properti protect provid public punish purchas purpos qualifi qualiti quantiti question rang rank rapid realiz refer reflect registr regul relat remot repres reput requir respons result right risk role room rule sabotag safeti scientif secret secur see servic set shouldn show singl situat social societi softwar solv somebodi sourc special specialist sphere spread state statist step still storag store strict strong structur struggl studi subject submit suffer swindl system tab tabul talk technic technolog telegraph telephon tendenc term termin text theft therefor think third thought threat time titl togeth top topic touch traid treatment two type unauthor union unlaw unsanct usa use user usual vast violat way weight white whose wide will wish without word work worker workers-specialist worri wound write written year