Abstract: In this paper an overall study of information protection is presented. The state of information and its types also given, methods of computer information systems and its aspects and measures of information protection discussed. A state of art of the current malware and its evolution is carried out.
Keywords: Information protection, information sources, computer crimes, hackers, malware
INTRODUCTION
Rapid development of automation processes and the penetration of the computers in all fields of life have lead to appearance of a range of peculiar problems. One of these problems is the necessity of providing effective protection to information and means of its processing. A lot of ways to access information, considerable quantity of qualified specialists, vast use of special technical equipment in social production make it possible for violators practically at any moment and in any place carry out the actions, which represent a threat to information safety. Particular role in this process has been played by appearance of personal computer (PC), which has made computers, software and other informational technologies available to general public. Wide distribution of PC and impossibility of conducting effective control of their use have resulted in the decreasing security level of information systems. In the current situation, data processing has moved the problems of information security forward to the rank of most important problems of national economy. Solving the problem of poor information security presupposes a complex of measures. First of all, such actions of government as development of classification system, documentation of information and protection methods, data access regulations and punishing measures against information security violators.
PROTECTION OF INFORMATION
Information
a. State informational sources Formation of state informational sources is carried out by
References: 1- Cohen, F. 1984. ``Computer Viruses - Theory and Experiments ' ', originally appearing in IFIP-SEC 84 and also appearing as invited paper in Computers and Security, vol.6 no.1 Pages 22-35. See also http://www.all.net/books/virus/index.html. 2- Message Labs. 2004. Email security intelligence report: January-June 2004. http://www.messagelabs.com/emailthreats/intelligence/whitepapers/pdf/sixreport.pdf. 3- "W32.Bobax.D", Symantec Security Response, 19 May 2004. http://securityresponse.symantec.com/avcenter/venc/data/pf/w32.bobax.d.html. 4- "Backdoor.Zincite.A", Symantec Security Response, 26 July 2004. http://securityresponse.symantec.com/avcenter/venc/data/pf/backdoor.zincite.a.html. 5- Sandvine. 2004. Trend analysis: Spam Trojans and their impact on broadband service providers, Sandvine Incorporated, June 2004. 7- Dwan, B. 2004. "The mobile phone virus", Network Security, July 2004, pp14-15.