Features of information security of computer systems

Presented is a comprehensive analysis of the issues of technological independence and information security of the computing system.The systematic approach involves the analysis of protection technologies at all levels of architecture and its interaction with each other.Hardware protection technologies at the processor and command system level are considered.Hardware support for virtualization turns out to be a necessary security function and is not less important than the already traditional security acure face lotion functions like an access control, identification, authentication, audit and security control.

In addition to hardware support for virtualization we discuss the implementation of the group of technologies for hardware support for a separate trusted environment in modern processors.The analysis of the possibility of using hardware protection technologies by intruders for malicious influences is carried out.Based on the research results, an approach to create a domestic protected architecture swisse high strength magnesium powder berry of computer equipment using foreign hardware protection technologies is proposed.At the same time, import substitution should not be limited solely to the replication of foreign solutions, since foreign computer equipments contain a lot of undocumented capabilities and, as a result, pose a threat to information security.

Leave a Reply

Your email address will not be published. Required fields are marked *