Download presentation
Presentation is loading. Please wait.
Published byAnnis Harrington Modified over 9 years ago
1
04.09.2015Prof.P.Bekh, Kiev, Ukraine1 Information security in IT society: humanitarian aspects. Prof. Petro Bekh Taras Shevchenko National University of Kiev
2
04.09.2015Prof.P.Bekh, Kiev, Ukraine2 IT – vunarability and impact E.g. Terrorist uses of the Internet: Propaganda & publicity; Fundraising (or finance); Information dissemination & sharing information; Underground communication & networking Recruitment & mobilization etc., etc.
3
04.09.2015Prof.P.Bekh, Kiev, Ukraine3 Consequences of data security violation political –resignation of a government; military –change of the cryptography technique; business – financial damages; personal – loss of job or accommodation
4
04.09.2015Prof.P.Bekh, Kiev, Ukraine4 Aspects of information security software data protection safety of data storage
5
04.09.2015Prof.P.Bekh, Kiev, Ukraine5 Information stored in a digital form list of top secrete agents financial transactions blood and cell analyses holographic copies of masterpieces
6
04.09.2015Prof.P.Bekh, Kiev, Ukraine6 Software methods of data protection the faster computers - the more sophisticated methods none of the codes could be cracked mathematically
7
04.09.2015Prof.P.Bekh, Kiev, Ukraine7 Destruction danger physical destruction is much more easier than decoding destruction has greater political effects weapon of terrorists
8
04.09.2015Prof.P.Bekh, Kiev, Ukraine8 Ways of solution compression algorithms firewalls antivirus programs dubbing technique read-only storages
9
04.09.2015Prof.P.Bekh, Kiev, Ukraine9 What should we store carefully commercial data political and official texts (documents, laws, agreements etc.) numerical tables manuscripts soniferous sources (songs, symphonies, etc.) paintings
10
04.09.2015Prof.P.Bekh, Kiev, Ukraine10 Sources of danger Crime Terrorism Fires, Floods, hurricane (like latest Katrina), earthquakes, etc.
11
04.09.2015Prof.P.Bekh, Kiev, Ukraine11 What the civilized world should do develop mathematical/software methods digitize masterpieces use copies instead of originals implement reliable storage techniques organize safe depositories
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.