Products
▸
Computer data is prone both to loss due to malfunction or destruction of equipment, and to theft. Protection methods include the use of hardware and devices, as well as specialized technical tools with software.
A better understanding of data leakage channels is a key factor in successful combating against unauthorized access and interception of data.
Integrated circuits in computers produce high-frequency fluctuations in voltage and current. Oscillations are transmitted by wire and can be transformed into a perceivable form. They also can be intercepted by special devices integrated in computers or monitors in order to capture information that is displayed on the monitor or entered from the keyboard. The data can be also captured when transmitted over external communication channels, for example, over telephone lines. Interception devices are detected with the help of special equipment.
There are several groups of protection methods, including:
Each method is implemented through various means. Organizational and technical means are the main ones.
The development of organizational means should be within the competence of the security service. Most often, security experts:
The group of technical means combines hardware and software means. Here are the main ones:
The complex of technical measures includes measures which make computer network facilities physically unavailable, for example, equipment of rooms with cameras and signaling.
Identification and authentication are used to prevent unauthorized access to information.
Authentication and identification are intended to provide or deny access to data. Authenticity is established in three ways: by a program, by an apparatus, or by a man. Apart from a person being an object of authentication, it can extend to hardware (computer, monitor and carriers) or data. Setting a password is the easiest method of protection.