RESEARCH OF METHODS OF PROTECTION OF CONFIDENTIAL DATA

Natalia A. Golovacheva

Senior Lecturer, Department of Information Security,

Volgograd State University

This email address is being protected from spambots. You need JavaScript enabled to view it.

Prosp. Universitetsky, 100, 400062 Volgograd, Russian Federation

Nikita P. Karpov

Student, Department of Information Security,

Volgograd State University

This email address is being protected from spambots. You need JavaScript enabled to view it.

Prosp. Universitetsky, 100, 400062 Volgograd, Russian Federation

Abstract. The article analyzes the main methods of protecting confidential information. Organizational and technical measures to protect it are considered. Criteria for an adequate assessment of methods for protecting confidential data are highlighted. Within the framework of experimental studies, the best method of protecting confidential data has been identified. Currently, much attention is paid to the protection of confidential information - that is, information that a limited number of people have the right to access. This may be personal data of citizens or secrets of commercial activity of firms, official and state secrets, or materials of legal proceedings. As a result of the leakage of secret information, there is a loss of customers, a decrease in income, etc. Attackers can seize valuable information, damage the reputation of citizens, gain access to bank accounts, private and state secret documents. To ensure the protection of confidential information, not only the development of separate mechanisms and methods of protection is required, but a whole systematic approach is needed - a set of measures, such as the use of software and hardware, engineering and cryptographic tools; legal and organizational measures. The complex nature of protection arises from the complex actions of intruders who seek to obtain important information for them by any means. Among the methods of preserving confidential data, the most common are: data certification, licensing, categorization, certification. Disclosure of confidential information is one of the main security threats. The implementation of threats is the result of one of the actions and events: disclosure of confidential information, leakage of confidential information and unauthorized access to protected information. In case of disclosure or leakage, the confidentiality of restricted access information is violated.

Key words: information security, information protection, threat to information security, personal data, confidential information, unauthorized access, cryptographic information protection.

 

Creative Commons License
This work is licensed under a 
Creative Commons Attribution 4.0 International License.
Attachments:
Download this file (3_Golovacheva_Karpov.pmd.pdf) 3_Golovacheva_Karpov.pmd.pdf
URL: https://ti.jvolsu.com/index.php/en/component/attachments/download/886
80 DownloadsUpdate this file (3_Golovacheva_Karpov.pmd.pdf)