Skip to main content

Currently Skimming:

Technical Protection of Electronic Documents in Computer Systems--Valery A. Konyavsky
Pages 103-114

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 103...
... It is obvious that if a plant produces teapots and a factory makes boots, then they will be potential targets for crime. Computer systems do not produce information.
From page 104...
... • network (telecommunications) resources • information technologies One important information security-related event that has occurred in the last decade is the appearance and development of the concept of device security.
From page 105...
... and information technologies -- technical (personal computers, servers) and programmatic (operating systems, preprocessor output programs)
From page 106...
... Electronic locks operate on a device basis to carry out user IA procedures, but they must resort to the use of external software to perform integrity control procedures. Device modules perform all the functions of electronic locks as well as integrity control and administration functions.
From page 107...
... • Control of applications software and data. The integrity of applications software and data may be monitored by the data security system on a device or software basis if its integrity was registered on a device basis at the preceding stage.
From page 108...
... Of course, the set of attributes must be sufficient for the purposes of describing the security policy, and the description must not be in operating system API terms but rather in terms that are customarily used by security administrators. ELECTRONIC DOCUMENT SECURITY The life cycle of the electronic document occurs in three spheres of existence, located concentrically one within the other: the electronic environment of numerical processes, the analogous environment of subjects and objects, and the social environment of cognitive subjects.
From page 109...
... Therefore, protecting the electronic exchange of information involves two classes of tasks: ensuring that the document remains equivalent to the original electronic document or standard over the course of its life cycle and ensuring that the electronic technologies used remain equivalent to the standards prescribed by the sector of effectiveness. In the electronic environment it makes no sense to interpret information as data, sense, knowledge, or fact.
From page 110...
... communications channels must be implemented through the application of certified cryptographic tools, including those involving electronic digital signatures, for every document transmitted. Another option is also possible, in which a packet of documents is signed with an electronic digital signature, and each document is verified with another analog of a handwritten signature, for example, an authentication security code.
From page 111...
... PROTECTION OF INFORMATION TECHNOLOGIES Electronic documents in automated systems are not only stored but also processed. A computer represents memory and computation.
From page 112...
... Furthermore, the presence of a particular authentication security code could be considered to signify the presence of a corresponding operation in the technological process, and the value of the code could also indicate the integrity of data at a given stage in the technological process. LIMITATION OF ACCESS TO DATASTREAMS As a rule, routers with a virtual private network builder function are used to limit access to datastreams.
From page 113...
... 1999. Information security management using the Akkord network security device.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.