Features of information security of computer systems
Features of information security of computer systems
Blog Article
Presented is a comprehensive analysis of the issues of technological independence and information security of the computing system.The systematic approach involves the analysis of protection technologies at all levels of architecture and its interaction with each other.Hardware protection technologies at the processor and command system level are 6-0 igora vibrance considered.Hardware support for virtualization turns out to be a necessary security function and is not less important than the already traditional security functions like an access control, identification, authentication, audit and security control.In addition to hardware support for virtualization we discuss the implementation of the group of technologies for hardware support for read more a separate trusted environment in modern processors.
The analysis of the possibility of using hardware protection technologies by intruders for malicious influences is carried out.Based on the research results, an approach to create a domestic protected architecture of computer equipment using foreign hardware protection technologies is proposed.At the same time, import substitution should not be limited solely to the replication of foreign solutions, since foreign computer equipments contain a lot of undocumented capabilities and, as a result, pose a threat to information security.