Abstract

The rapid development and constant growth of the use of computer equipment, wireless radio access systems, increasing the functionality of electronic means of personal use require a timely response to threats of information leakage through technical channels. This state of affairs has exacerbated the problem of identifying technical channels of information leakage arising from technical progress, and with it the need to ensure the required level of efficiency and cost of the process of searching and identifying technical channels of information leakage. The next important issue is the adequacy of measures to protect information from leakage through technical channels, verification and control of their effectiveness, determining the economic feasibility of the proposed set of measures. The use of existing means of search and detection of technical channels of information leakage, its further protection are based on the use of both active and passive methods. The article highlights methods and tools of protecting information from leakage by technical channels via side electromagnetic radiation and guidance during their processing using technical means, when transmitting via radio and optical communication channels, channels of leakage of acoustic (speech) and visual information. Basic steps to protect information from leakage by acoustic, vibroacoustic and optoelectronic channels are defined, which centre around reducing the level of acoustic and vibroacoustic signals, voicing information, to a certain signal-to-interference ratio. The passive and active measures analysed in the article are aimed at achieving the required signal-to-interference ratio. Passive information protection measures and their focus on improving the sound insulation of enclosing structures of information activity objects are highlighted. Active information protection measures and their impact on reducing the signal-to-interference ratio to normal by creating acoustic and vibroacoustic interference at the border of enclosing structures of information activity objects are analysed. The conceptual foundations of technical information protection, its basic principles are given, with the principal methods and means of ensuring information security for each of the possible leakage channels defined.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call