Abstract

This article is devoted to one of the most relevant and demanded topics ­ information security. One of the reasons for this is that because of the pandemic, the world’s population has switched to a digital management system through computer networks. As a result, the main part of the system of higher, secondary, and special education switched to the forms of distance learning. In this article, we tried to answer, based on scientifc research, the questions related to what standards and safeguards should be used to ensure the security of data in computer systems and networks of higher education institutions. At present, all educational institutions have their computer systems and networks, perform all the necessary calculations and organizational work, and also carry out the educational process based on computers. We focused on the issues of ensuring their security in the process of transmitting or receiving data through the switching networks available on these computers. The article analyzes the issues of information security in local networks of information systems, based on the systematization of information from the point of view of information security, information security system, and optimal data management. By analyzing how data transmitted over communication channels of computer networks are delivered with errors and delays, we get an idea of what parameters and characteristics should be used as the main criterion. It has been proved that in computer systems and networks used in higher educational institutions and research institutes, it is necessary to pay great attention to the protection of information, to widely use organizational, technical, legal, cryptographic tools to eliminate risks and attacks. As the main criterion, taking into account the technical and economic parameters of information protection, it is proposed to take into account confdentiality, the need for each information, and its value. This article is intended for those who research the feld of information security management in computer systems and networks

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call