How do you understand it attack?
How can we get protected from IT attack?
Download 113.12 Kb.
|
ingliz tilidan yaniyga javob
How can we get protected from IT attack?
The creation of the global information space, the mass use of personal computers and the development of computer systems create complex problems of information protection. Organization of reliable protection in these systems requires large material and financial costs, complex research. Also, depending on the value of the information, there is a need to develop the optimal, appropriate level of protection costs. Estimating the costs of ensuring a high level of information security requires a thorough study of possible attacks, determining the degree of danger of each of them. "Detected objects". Who creates malware and why? First, let's answer the most basic question. Who needs this? Why computers, networks, mobile phones have become a place to distribute not only useful information, but also various malicious programs? It is not difficult to answer this question. All (or almost all) inventions, mass-use technologies have sooner or later become tools of thugs, fraudsters, fraudsters and other criminals. As soon as there is an opportunity to use something for the purpose of hooliganism or crime - of course, there will be those who use these new technologies not for the purposes intended by the inventor, but on the contrary, with malicious intentions or to show their personality to others. Unfortunately, computers, networks, mobile phones, computer and mobile phone networks were not spared from this fate. As soon as these technologies began to be widely used, they fell into the hands of malicious people. However, the "criminalization" of the news happened gradually: it appeared in the form of Computer hooliganism - Petty theft - Criminal business - Semi-secret business. Computer bullying. Most of the virus and trojan programs are created by students and students who have just learned the programming language and want to try their hand in this field, but have not found a better way to use it. Such viruses were created and are being created only for their authors to show themselves. It is good to note that most of these viruses were not distributed by their authors, and the viruses died after some time with their self-storage disks, or the antivirus (anti-virus) with messages from their authors that they would never distribute them elsewhere. sent to their companies. The second group of virus creators is made up of young people (mostly students) who have not yet mastered the art of programming. The only motivation for creating a virus is a state of dissatisfaction with its own characteristics, and the desire to fill it with computer hooliganism. The pen of such "master farangs" belongs to viruses created by making very simple and big mistakes ("student viruses"). With the development of the Internet and the emergence of many websites dedicated to the creation and teaching of computer viruses, the life of such virus creators has become much easier. In such web resources, you can find detailed recommendations on methods of logging into the system, methods of opening antivirus programs, and spreading the virus. Often, one can find here ready-made original texts that only require minor "authorship" changes and compilation (writing a composite work) with the recommended method. Most of these virus creators, who have grown up in age and gained experience, belong to the third most dangerous group, who create "professional" viruses and distribute them to the world. These well-thought-out and established programs are created by skilled, and in many cases, talented programmers. Such viruses use sufficiently original algorithms for breaking into the system environment of information, errors in the security systems of operating environments, social engineering and other tricks. The fourth group of virus writers stands out - these "researchers" are highly intelligent programmers who invent completely new methods of infecting, opening, resisting antiviruses, and so on. They come up with ways to integrate into new operating systems. These programmers create viruses not just for the sake of viruses, but for the purpose of studying the possibilities of the "computer world", so-called "conceptual" ("Proof of Concept" - PoC) viruses. Often, such virus creators do not distribute their creations, but promote their ideas through numerous Internet resources dedicated to virus creation. At the same time, such "research" viruses also pose great risks - falling into the hands of "professionals" of the previous group Is the any relationship between humanity and information? In the process of transition to an information society, significant changes are taking place in the personal life of people, from the form of spending free time to family relationships. In this, the information supply of homes, where a large part of people's personal life is spent, undergoes major changes. An integrated infrastructure is created inside and around the house, and through this infrastructure, a person will have information services and communication channels. Currently, instead of electric networks, telephone cables, television cables, signaling cables, houses are being built with one electric cable and one information cable. In this case, the function of the information cable includes all information communications, satellite TV channels, access to the Internet, security and fire protection systems, etc. Special computers installed in such houses control the work of all necessary devices such as household appliances, heating system, security system through a special program. Also, the system collects information about the consumption of water, electricity, gas and other resources and provides information about the amount of payments. Such houses are also called "smart houses". In many countries The car is considered a special form of living environment. "Smart" models of cars have been developed and spread widely. Such cars are equipped with devices that allow to communicate with local information services, determine the most optimal route, communicate with the "smart" house and control it, in addition to the micro-power devices that control the technical parts. People's ways of spending their free time are also changing before our eyes. In the stage before the information society, television has become very important in people's lives. Modern information technologies have made great changes in people's everyday life. Many families have a computer and the Internet in their homes. The types of spending free time in front of the computer are diverse and include processes from carrying out official tasks to playing computer games. Computer games can be played both individually and in groups connected through the network. The amount of time spent "sitting" on the Internet without any purpose is also increasing. Multimedia tools allow you to go to the expanses of virtual reality without leaving home. At the same time, you can travel to educational sites, virtual museums, etc. Information culture is a part of the general culture, and how to spend free time depends on the individual. In some countries, payments can be made using "electronic money". Instead of a monthly salary, employees are given a special check. These checks are converted into cash with the help of bank machines installed on the streets of the city. Payment for some services can be made by check, some by credit card. A common type of service in the information society is Internet magazines. For example, the process of buying a book from an Internet magazine that sells books can be approximately as follows: first, on a special website, you get to know the information about new books and determine their prices. Then the order form is filled in (on-line) mode. Here, the buyer enters information about his credit card or other type of payment. If the credit card is valid, the payment will be made immediately. Within a few days (very quickly) the buyer will receive the book he purchased by mail. The problem of information security of the individual, society and the state. While the development of information technologies has positive consequences for the life of society, it also creates many problems of its own. We will consider some of them. As we approach the stage of the information society, the problem of protection of the right to privacy of the individual and the state in relation to some information becomes more urgent. Currently, in countries where the Internet is widely used, the issue of information protection is the first priority. Everyone who provides information about himself to state bodies or a company has the right to guarantee that this information will not be disseminated and used against him. The problem of information security is considered the most urgent for individual citizens, for various companies and organizations, and for the state as a whole. Let's list some risks and problems on the way to an informed society: Theft of confidential information related to the personal life of people and organizations with the help of information technology tools; Influence on society by mass media and those who control these media; From the mass of information in a large volume, quality and Download 113.12 Kb. Do'stlaringiz bilan baham: |
Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling
ma'muriyatiga murojaat qiling