04.09.2015prof.p.bekh, kiev, ukraine1 information security in it society: humanitarian aspects....
TRANSCRIPT
04/19/23 Prof.P.Bekh, Kiev, Ukraine 1
Information security in IT Information security in IT society: humanitarian aspects.society: humanitarian aspects.
Prof. Petro Bekh
Taras Shevchenko National University of Kiev
04/19/23 Prof.P.Bekh, Kiev, Ukraine 2
IT – vunarability and impactIT – vunarability and impact
E.g. Terrorist uses of the Internet:
• Propaganda & publicity;
• Fundraising (or finance);
• Information dissemination & sharing information;
• Underground communication & networking
• Recruitment & mobilization etc., etc.
04/19/23 Prof.P.Bekh, Kiev, Ukraine 3
Consequences Consequences of data security violation of data security violation
• political –resignation of a government;
• military –change of the cryptography technique;
• business – financial damages;
• personal – loss of job or accommodation
04/19/23 Prof.P.Bekh, Kiev, Ukraine 4
Aspects of information securityAspects of information security
• software data protection
• safety of data storage
04/19/23 Prof.P.Bekh, Kiev, Ukraine 5
Information stored in a digital Information stored in a digital formform
• list of top secrete agents
• financial transactions
• blood and cell analyses
• holographic copies of masterpieces
04/19/23 Prof.P.Bekh, Kiev, Ukraine 6
Software methods of data Software methods of data protection protection
• the faster computers - the more sophisticated methods
• none of the codes could be cracked mathematically
04/19/23 Prof.P.Bekh, Kiev, Ukraine 7
Destruction dangerDestruction danger
• physical destruction is much more easier than decoding
• destruction has greater political effects
• weapon of terrorists
04/19/23 Prof.P.Bekh, Kiev, Ukraine 8
Ways of solutionWays of solution
• compression algorithms
• firewalls
• antivirus programs
• dubbing technique
• read-only storages
04/19/23 Prof.P.Bekh, Kiev, Ukraine 9
What should we store carefullyWhat should we store carefully
• commercial data• political and official texts (documents, laws,
agreements etc.)• numerical tables• manuscripts • soniferous sources (songs, symphonies, etc.) • paintings
04/19/23 Prof.P.Bekh, Kiev, Ukraine 10
Sources of dangerSources of danger
• Crime
• Terrorism
• Fires, Floods, hurricane (like latest Katrina), earthquakes, etc.
04/19/23 Prof.P.Bekh, Kiev, Ukraine 11
What the What the civilized world should docivilized world should do
• develop mathematical/software methods
• digitize masterpieces
• use copies instead of originals
• implement reliable storage techniques
• organize safe depositories