KPETOB.COM

Kretov Nikolay Nikolaevich: Protection of access to information

1. Password protection

To protect access to various resources, passwords are used, that is, the computer provides access only if you are registered and entered the password. Each user can be assigned access to different resources.

Password login can be set in BIOS Setup. By setting a password in this program, the computer will not start loading the operating system until you enter the password specified during its installation. It is not easy to overcome such protection and it will lead to serious problems if you forget your password. Also, the password is set after the operating system is loaded, immediately before entering the workspace.

2. Biometric security systems

Nowadays, biometric identification systems are often used to protect access. This system does not work with a password, which means that it is much more difficult to fake it. These information protections include:

  • Fingerprint protection.
  • Iris protection.

And this is not the whole list, but we will talk about these two methods and so we will start.

2.1 Fingerprint identification.

Fingerprint scanners are installed on a variety of devices. For example, on flash drives, keyboards, laptops, airport or bank terminals, etc.

The scanner compares the fingerprint attached to it with the one that was added when it was configured. If they do not match, then access to the information will be denied. But this is not a very reliable way. If you injure your finger, it is quite possible that the print will change. Although I think that this problem will be fixed soon, or maybe it is no longer a problem.

2.2 Iris identification.

The iris of the eye is unique to each person and almost does not change throughout life.

A certain mask of barcodes is superimposed on the image of the eye, and at the end an individual matrix is ​​formed for each person. For this, special scanners are used. This method is more reliable than the previous one, but less popular in use.