Environment

What is protection: concept and types

Table of contents:

What is protection: concept and types
What is protection: concept and types

Video: Differential protection 2024, June

Video: Differential protection 2024, June
Anonim

Almost everyone is approximately aware of what protection is. But not everyone knows that there are various types of it. It can be aimed at any area of ​​human activity. In general, protection is understood as a complex of certain measures that are aimed at preserving the integrity, intactness of something.

What are remedies?

Image

Remedies are also different. In the individual sphere, it is fair to say that a person should have a certain set of knowledge, skills, as well as objects that will help to carry out this action.

Personal protective equipment (PPE) are tangible objects with which you can ensure the safety of the individual from various chemicals, radioactive substances. It is important to understand in this case what protection is, so that all means are used as intended.

Depending on the direction of PPE, there are two types:

  1. Intended for respiratory system. This group includes gas masks capable of filtering all toxic substances, respirators or basic agents.
  2. Necessary to maintain the integrity of the skin. Here it is appropriate to say about various costumes made of special material that do not allow, for example, radiation waves. This includes ordinary human clothing, as well as a work uniform.

Individual protection

Image

What is personal protection? These are, first of all, measures that are aimed at ensuring safety for oneself.

At the time of a collision with offenders or just gangsters, you need to have certain skills and means. Thus, individual protection is provided when a person can prove himself in hand-to-hand combat, which will help in self-defense. Also, he can always carry with him a pepper spray, which is in working condition, or a stun gun.

Data protection

Image

Information protection is also a measure that helps to store all information without fear of losing it, as well as protect them from hackers. That's what information protection is in the modern sense.

The priority in terms of security is given to information that belongs to commercial organizations. It is also necessary to protect all classified documents from crackers.

The safety of information is ensured by special program management, as a result of which only a number of persons have access to information. But access to what exactly? As a rule, these are state secrets, any agreements between organizations, a list of ideas that need to be implemented in order to raise the financial level. Many people who ensure the secrecy of such information understand what protection is. This is a specific mode that gives access to information at a specific time to specific users with an individual IP address.

Such a process is included in the list of mandatory conditions for the existence of the enterprise. As a rule, secrecy is carried out by the state; it is also a guarantor of the protection of confidential rights of workers.

The essential features of the concept

Image

Organizations use a special model, on the basis of which all their activities take place:

  1. Confidentiality - only people who have the right to access it can access information. Otherwise, access will be denied.
  2. Integrity - the desire throughout the entire period of operation of the enterprise to realize the intactness of the information. Thus, the information ultimately has the same form.
  3. Accessibility - people who have the right to this information are without fail admitted to their study, viewing, change. The main rule is sanctionedness.

We replenish this standard, therefore there are indirect points that sometimes use:

  1. Non-repudiation - once established access to information is not always needed repeatedly. This clause assumes that a re-operation is not necessary since the customer remains the same.
  2. Accountability - all visits to the database or the closed site are clearly traced, in particular the actions that are performed there.
  3. Reliability - the user and his actions should not change their character over time. This is necessary for the information to be complete in its totality.
  4. Authenticity - follows from the previous paragraph. Thus, the information does not change its quality.

Data protection

Image

Every new employee in an enterprise or organization must understand what data protection is. For this reason, there are a number of actions that involve ensuring the safety of all data.

  1. First you need to clarify in which particular industry the personal data is used.
  2. Take one as an example and analyze it. Here, as a result, information appears about who has access and what exactly. Also at this stage, the concept of what protection is, how to provide it is under construction.
  3. It is highlighted which systems are used for data processing.
  4. Later they are classified, as well as the information itself.
  5. It is assumed what danger may affect the integrity of the information.
  6. Against this background, protection measures are lining up.
  7. The process is clearly explained to people with access so that they are prepared to provide security.
  8. When working with data, each operator must authorize its access. He submits a notification to the authorized body that he begins processing all the information.
  9. The FSTEC of Russia should provide information that will form the measures for protection.
  10. Then the operator himself works on the security system, taking into account the information received.
  11. All documentation is drawn up in the right way, and then it is sent for verification.