z-logo
open-access-imgOpen Access
Problems of personal data and information protection in corporate computer networks
Author(s) -
A. L. Zolkin,
E. M. Abdulmukminova,
V. N. Malikov,
A. N. Lepshokova
Publication year - 2021
Publication title -
iop conference series. materials science and engineering
Language(s) - English
Resource type - Journals
eISSN - 1757-899X
pISSN - 1757-8981
DOI - 10.1088/1757-899x/1047/1/012102
Subject(s) - computer security , computer science , authentication (law) , identification (biology) , confidentiality , password , encryption , information security , information protection policy , data breach , information sensitivity , personally identifiable information , data protection act 1998 , internet privacy , biology , botany
The article discusses the problems of personal data and information protection from intruders as well as methods of authentication and identification in corporate networks. Various methods of authentication and identification in computer networks are presented. Their comparative analysis is carried out, the features and disadvantages in various areas of use are highlighted, risks and possible damage from violation of data confidentiality are analyzed. The magnitude of violations of confidentiality, availability and integrity of information is growing every year, at the same time, the caused damage is growing. This situation makes it necessary for information security specialists to analyze all the risks of illegal access to information more and more thoroughly, and then resort to the introduction of modern means authentication, use new encryption methods, increasingly generate new passwords to access the system. Today, there are many ways and methods of authentication, but the specific of their application depends on the location of the information storage and its value. Meanwhile, authentication methods are not perfect protection methods, they are also vulnerable and here the situation is mostly depends on the skills of the attackers. In addition, the article discusses the problems of information security threats to flash drives, analyzes the FAT32 and NTFS file systems of flash drives as well as their vulnerabilities to malicious programs. The features of the algorithm of virus action on flash drives are highlighted. Today, there are many ways and methods of flash drives protection, but the specifics of their use depends on the location of the information storage and its value.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here