Abstract

The article discusses the problems of personal data and information protection from intruders as well as methods of authentication and identification in corporate networks. Various methods of authentication and identification in computer networks are presented. Their comparative analysis is carried out, the features and disadvantages in various areas of use are highlighted, risks and possible damage from violation of data confidentiality are analyzed. The magnitude of violations of confidentiality, availability and integrity of information is growing every year, at the same time, the caused damage is growing. This situation makes it necessary for information security specialists to analyze all the risks of illegal access to information more and more thoroughly, and then resort to the introduction of modern means authentication, use new encryption methods, increasingly generate new passwords to access the system. Today, there are many ways and methods of authentication, but the specific of their application depends on the location of the information storage and its value. Meanwhile, authentication methods are not perfect protection methods, they are also vulnerable and here the situation is mostly depends on the skills of the attackers. In addition, the article discusses the problems of information security threats to flash drives, analyzes the FAT32 and NTFS file systems of flash drives as well as their vulnerabilities to malicious programs. The features of the algorithm of virus action on flash drives are highlighted. Today, there are many ways and methods of flash drives protection, but the specifics of their use depends on the location of the information storage and its value.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call