Главная | Соглашение | Публикация статей

Time to create protection
Категория: English version

Is not difficult to determine who needs to develop ways to protect information. These are people and organizations who have something to defend, ie virtually everything. Most of those in need, of course, use protection technology developed by others, but in some cases, information security tools are developed on its own.
During the development of his defense, it makes sense to take in three cases:
- Protection system developed as a commercial project;
- The existing remedies are not able to provide the necessary functionality;
- The existing remedies are not appropriate for security reasons.
The first case where the protection is developed with a view to profit, of little interest - it is an ordinary commercial project, which ensure the reliability of protection may well not play any role. The sole purpose of the developer - to extract maximum profit.
In the second case the user needs to protect the information in some unique circumstances for which none of the existing system was not designed. Such situations occur regularly as a direct consequence of technology development. Until the computers will not need encryption algorithm des. Are not yet widely available mobile technology, are not required to implement persistent cryptographic algorithms for processors used in mobile phones. The development of new technologies in every field - a very risky occupation, but data protection risk increases manifold. Risk not only data processed during the period following the discovery of the error enemy and to correct the error, but in general all the information that is protected at a time when there was a mistake.
The third case zanimatelen that, despite the presence of security, seemingly suited to the task, there is no confidence in the reliability of existing solutions. And if the value of the loss of integrity or confidentiality of information & chnoy very high (which is quite possible, for example, banking and state secrets), it makes sense to spend resources to develop its own implementation of protection. So the U.S. once spent on developing the algorithm des rsa and now feels safe. After all, to reach a rational belief that the protection funds set up by someone else, do not include accidental or intended made vulnerabilities, it is very difficult.


Time to create protection

Статьи по теме:

The choice of the video
Bus EISA
The story of software Escrow
Team-quality design of computer
Printing without a printing press? It is possible
Classification of computers
Technology Platform 1C: Enterprise 8 - Areas Development
The development of databases on Msde 2000, working with Free Database Mssql
The new search software
Tips and Tricks - Picasa will
Linux set in motion devices: Now in the market
Make backup ropii professionally - Norton Ghost 14
Perfect System Digital Surveillance Uniteco Dvs
Threats to Security Modern Networks
Type Danyh in C + + I Unlike Java
Concentrators Fast Ethernet NetGear
Best Antivirus
ISA bus
Network
Access
Sugarcrm In Russia
SWISH Max or Flash animation effects
Greedy cabinet creators Spyware is testing!
What brings Sp1 For Windows Vista?
HISTORY OF BUILDERS
Automation planning printing by Apple (Mac)
Free software, whether or not to be
Loading the alternative mode
More WinRAR 3.70 RU Final
ABOUT personal characteristics COMPUTER CRIMINALS
Law Bezopasnosti
Macromedia Dreamweaver against Microsoft placed on the first lane
Office automation
Restoring files myth or reality?
Computer technology and Genealogy
Why work for a computer is harmful to human health
Desperate to know if he lies or fake?
Data protection. Luxury or means of survival?
Gigabit Ethernet Technology
Microprocessors used in CompactPCI-systems
The funds protect your computer and maximum security
Changing the design desktop
Marking + control autopsy with labels B-367
Fire systems company Satel now can be controlled by phone or Ethernet
ATM technology
Review converters for video
Windows Media Player
Robot Tartalo knocking at your door
Mikrokontrolleryne System
Playing audio and video files
The development control information tools for PADS
WAYS OF COMPUTER CRIMES
The situation for the computer
3Ds Max 2008 (Rip)
VISA-2000. Virtual seller of computer equipment