In the courtyard of the twenty-first century, machines have successfully replaced obsolete accounts, office ledgers and, to some extent, even books. It is somehow not even solid to store information on a paper sheet, because almost every house has a personal computer. But the more data is transferred to digital media, the more acute are the threats to information security. So, the problem of protecting data from threats threatening them requires constant attention. In order for tactics in data protection to be most effective, an analysis of all possible threats that could potentially damage protected information is needed.
The classification of information security threats contains two main types: artificial and natural threats.
, . , , , . . , , , – .
, , , . .
. , , . , . .
, .
– , .
, - , . , , . , , . , , .
, , , , , . , . , , , , .
, , , .
- , , .