FUNDAMENTALS OF INFORMATION SECURITY

AND INFORMATION PROTECTION

Vladislav G. Yarikov

Candidate of Sciences (Pedagogy), Associate Professor,

Department of Information Security

Volgograd State University

This email address is being protected from spambots. You need JavaScript enabled to view it.

Prosp. Universitetskiy, 100, 400062 Volgograd, Russian Federation

Maxim V. Pashkov

Student, Department of Information Security,

Volgograd State University

This email address is being protected from spambots. You need JavaScript enabled to view it.

Prosp. Universitetskiy, 100, 400062 Volgograd, Russian Federation

Abstract. The text deals with the protection of confidential information in enterprises and corporations. It describes the value of such information and the need to protect it from leaks and illegal encroachments. It discusses the role of regulations and the creation of information protection mechanisms by enterprises themselves. Information of particular value to corporations and government agencies and the secrecy status of documents containing such information are also discussed. In addition to discussing the protection of confidential information, the article considers issues related to determining the value of information and its legal status. It is noted that not all information may be confidential or of value to third parties. It is defined that the value of information can be material, scientific, technological or technical. The regulation of information by the norms of patent and copyright law is discussed. The temporal nature of the value of information and its dependence on the time a competitor has to create similar information are emphasised. Different channels of information transmission, including classified information, are considered. The paper also discusses the various channels of leakage of sensitive information, such as speech, physical and technical. The authors discuss overt and covert methods of obtaining information as well as the causes of information disclosure, such as loss, improper destruction, a lack of attention to information protection and excessive talkativeness.

Key words: protection, system, security, information, technology.


Creative Commons License

This work is licensed under a 
Creative Commons Attribution 4.0 International License.
Attachments:
Download this file (4_Yarikov, Pashkov.pdf) 4_Yarikov, Pashkov.pdf
URL: https://ti.jvolsu.com/index.php/en/component/attachments/download/907
53 DownloadsUpdate this file (4_Yarikov, Pashkov.pdf)