In the modern information age, when technological progress has reached seemingly unprecedented heights, the question of information protection is acute. The basics of computer security allow you to manage this process, preventing many problems.
Why protect information? And most importantly, from what? We have to answer these questions. So, what data can be attacked and what consequences does it entail?. , , , . , . , ? . , "" . , . - , . . , ? . , .
A separate story about organizations that contain information in their archives under the heading "Secret." State or military secrets are carefully protected by law, but even here there are some incidents. What is only the famous Internet resource, constantly analyzing materials "leaking" out of national control. Not only the dissemination of classified information, but also its corruption or change brings enormous problems. It should be noted that before, when the distribution of technical means was not so comprehensive, the basics of computer security were necessary primarily for the above organizations.Internal threat
, . , . . , , , . , , , .
. , , . , - . . " ", 2006 .
:
- .
- , , .
- .
Over time, the need to protect information is becoming ever more acute. More and more specialists are engaged in its provision. And how many more university students study the theoretical foundations of computer security. Perhaps in the near future there will be no trace of problems with data protection.