THE METHODS OF PROTECTING INFORMATION IN TELECOMMUNICATION SYSTEMS

Authors

 

 Abdulla-zade M.Kh. – Aspirant the Department of History of Science and Technology, senior lecturer at the Department of Multi-Network Telecommunication Systems, Khujand State

University, Khujand, Republic of Tajikistan, abdullazade.mazbut@mail.ru

 Goibov S.A. – Head of the Branch of OJSC (Open joint stock company) “Tojiktelecom” of the Sughd region, aspirant the organization of education “Belarusian State Academy of

Communications”, Republic of Belarus, goibov70@mail.ru

 

Annotation

 

  The article examines the process of development of information technology and the comprehensive use of computers in all areas of human activity. The problem of raising the degree of information security to a higher level is being solved. It is noted that in modern conditions it is required to find a solution to the problem, taking into account a set of new conditions for the circulation of information, the creation and use of information resources, which are collectively called the information environment. Nowadays, when the volume of received and processed information is growing steadily, its value is also increasing. At the same time, it is required that the transmitted information reaches the addressee and the original owner in a timely manner, without distortion, in accordance with the rules. A promising solution to this problem of information security or information protection is the differentiation of access to a given flow. To achieve this, can be used the routers with the “VPN-builder” function. It is concluded that this function can only be performed using reliable cryptographic tools. In such cases, special attention should be given to the key system and the reliability of their storage. The requirements for access policy when separating the direction of transmitted information is fundamentally different from the requirements when restricting access to files and folders. Here only the simplest mechanism is possible – access to the user is allowed or denied.

 

Keywords

 

information security, standards, data protection system, data storage, information society, various protection methods

 

References

 

  1. Avezov A. H. Application of information technologies for teaching scientific creativity. Bulletin of the Tajik State University of Law, Business and Politics. 2014. No. 1 (57). pp. 316-327.
  2. Babash A.V. Information security. Laboratory workshop: Textbook / A.V. Babash, E. K. Baranova, Yu. N. Melnikov. – M.: KnoRus, 2016 — – 136 p.
  3. Gafner V. V. Information security: A textbook / V. V. Gafner. – Ph/D: Phoenix, 2017 — – 324 p.
  4. Gromov Yu. Yu. Information security and information protection: A textbook / Yu. Yu. Gromov, V. O. Drachev, O. G. Ivanova. – St. Oskol: TNT, 2017. – 384 p.
  5. Efimova L.L. Information security of children. Russian and foreign experience: A monograph / L. L. Efimova, S. A. Kocherga. – Moscow: UNITY-DANA, 2016 — – 239 p.
  6. Efimova L.L. Information security of children. Russian and foreign experience. Monograph. Vulture of the UMC “Professional textbook”. Gryph of the Research Institute of Education and Science. / L.L. Efimova, S. A. Kocherga. – Moscow: UNITY, 2016 — – 239 p.
  7. Zapechnikov S.V. Information security of open systems. In 2 t. T. 2 — protection in networks / S.V. Tabachnikov, N.G. Miloslavskaya, I.A. Tolstoy, D.V. Ushakov. — M.: GLT, 2018. — 558 c.
  8. Malyuk A. A. Information security: conceptual and methodological logical foundations of information security A. A. Malyuk. — M.: GLT, 2016. — 280 c.
  9. Partyka T.L. Information security: textbook / T.L. Partyka, I.I. Popov. — M.: Forum, 2016. — 432 c. 10. Petrov, S.V. Information security: textbook / S.V. Petrov, I.P. Slinkova V. Hafner. — M.: ART, 2016. — 296 c.
  10. Semenenko V.A. Information security: A textbook / V.A. Semenenko. – M.: MGIU, 2017. — 277 p.
  11. Chipiga A.F. Information security of automated systems / A.F. Chipiga. – M.: Helios ARV, 2017. — 336 p.
  12. Shangin V.F. Protection of computer information. Effective methods and means. Moscow: DMK Press, 2008. – 544 p. – ISBN 5-94074-383-8.

 

Publication date

2023-10-27

 

Leave a Comment