Abstract

The problem of providing of information security at the all levels can be solved effectively only if there will be found and activated a Complex Information Security System (CISS), which will cover the entire life cycle of computer systems (CS), starting from design and ending up with recycling, and all the technological link of collection, storage, processing and transmission of information. Therefore, the main purpose of the research in this paper is the development of integrated protection, which will prevent physical access to confidential information, its copying, theft or damage in server rooms. The use of modern high-level programming language Python and symmetric codifying algorithm AES allows the programming part of complex protection to work as quickly as possible, which leads to a rapid transfer of data from personal computer to remote server. Developed CISS allows keeping of confidential information even in a case of unauthorized access and theft of equipment. Program part allows reserv ation of data to 50 Mb (after the SMTP protocol) and more than 50 Mb (after the FTP protocol), speed of operation in this case is 15-20 sec (after the SMTP protocol) and 2-3 sec (after FTP protocol) if dimensions of file is 50 Mb. Thanks to using symmetric cryptosystem AES-256 which has a length of key of 256 bit we reached to obtain maximum crypto stability if compare with alternative software-hardware complex information security system Secret Disk Secret NG 3.2 which uses cryptosystem DES with length of key of 56 bit. For instance to ‘crack’ AES-256 we need approximate 3.78×10 63 years p rovided that you go over million keys per second. The developed system can be used in all fields of application whose work is connected with the use of server rooms and who have no need in high qualified staff to servicing this system. Therefore, if compared to alternative CISS, the one reviewed in the article is more reliable thanks to newer encryption algorithm and capability to prevent data losses in the case of unauthorized access to the room.

Highlights

  • Introduction ware levelThis system works quickly even on small-sized devices as smart phones, smart-cards etc

  • The problem is the inability of most methods to block all ways of information leakage remains a problem [1, 2]. In such a way we come to conclusion that an alternative approach to solve the information security problem is combination of hardware and software provisions

  • Software corresponds to a program which can perform actions on private information

Read more

Summary

Introduction

Introduction ware levelThis system works quickly even on small-sized devices as smart phones, smart-cards etc. In such a way we come to conclusion that an alternative approach to solve the information security problem is combination of hardware and software provisions. Software corresponds to a program which can perform actions on private information Information Security System must have several levels including namely to encrypt it, archive, send it as a file which will supplement each other, and such protocols FTP and SMTP.

Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call