P The primary source for creating information publications is scientific, industrial and technical literature. By recording the immediate results of scientific research and technical developments, it forms the primary flow of scientific and technical information. Its main element is the primary scientific document, which is a scientific work presented in writing, i.e. fixed on a tangible medium. A scientific document is called a primary document because it records the direct results of scientific research and technical developments and production activities.

Primary flow of scientific- technical information includes a variety of published and unpublished primary documents. Published articles include scientific and engineering monographs, articles in scientific, scientific-technical, industrial journals and collections, descriptions of inventions, etc. The basis of the flow of published scientific documents is made up of periodicals (magazines and collections), which account for up to 70% of all published scientific documents. technical information. Unpublished (unpublished) include reports on research and development work, dissertations, abstracts of dissertations, deposited manuscripts, scientific translations from foreign journals, design documentation for non-standard equipment.

Growing rapidly, the flow of primary documents literally overwhelms scientists and specialists interested in the rapid use of information on areas of science and technology that interest them. Serious obstacles to the assimilation of new information are their scattering across various documents (in particular, due to the differentiation of science), lack of awareness of information consumers, interlingual and other barriers. Thus, the reader (consumer of information) is unable to independently monitor the entire flow of primary documents on his profile.

Scientific information activities, which arose from the need to provide scientists, engineers and other workers in the national economy with the scientific and technical information they need, are aimed at eliminating interference. The increasing pace of scientific and technological progress has led to the creation in our country state system scientific and technical information (GSNTI). It includes NTI bodies of four levels: 1) all-Union; 2) central industry ones; 3) territorial (republican institutes, intersectoral centers and sectoral republican NTI services); 4) information departments (bureaus) in research institutes, design, engineering and other organizations.

Scientific and information activities at GSNTI include collection, analytical and synthetic processing, storage, search and dissemination of scientific and technical information. A special role among these procedures is given to analytical and synthetic processing of information. It refers to creative processes that include comprehension, analysis and evaluation of the content of documents in order to extract the necessary information. The processes of analytical and synthetic processing include: bibliography, annotation, abstracting and preparation of reviews. As a result of these processes, a bibliographic description, annotation, abstract, and review are obtained. ASPI is also associated with indexing documents, extracting facts from their content and, to some extent, translating from foreign languages.

A bibliographic description is a set of information about a document (its part or group of documents) necessary and sufficient for its general characteristics and identification.

An annotation is a brief description of a document (a set or part of documents) in terms of content, purpose and form. Typically, an annotation is used to supplement the bibliographic description and thereby characterize the source document in more detail.

The abstract, unlike the annotation, sets out the content of the primary document. Moreover, GOST 7.9-77 requires that it include “as much information as possible contained in the primary document.” However, it must be taken into account that the volume of the abstract is usually regulated. Therefore, it can be given the following definition. An abstract is a semantically adequate, limited in volume and at the same time possibly complete presentation of the main content of the primary document, characterized by a consistent structure and intended to perform a variety of tasks. information functions when used by readers of various categories.

A review is a systematic presentation of information on a specific topic based on an analysis of the content of a certain set of documents in order to assess the state, trends and prospects for the development of the subject of review.

Thus, through analytical and synthetic processing of primary documents, it is possible to carry out a high-quality selection of information and present it in a condensed, condensed form that provides information about the primary source (bibliographic description, abstract), about its main content (abstract) or about any subject ( review). New documents obtained as a result of analytical and synthetic processing are called secondary.

All the main results of the activities of NTI bodies are implemented in the editorial and publishing process. Thematic divisions specializing in the relevant fields of science, technology, economics, and editorial and publishing departments or departments (RIO) in institutions, enterprises, etc. participate in the preparation and publication of information publications in NTI bodies.

NTI bodies create and form two information flows: downward and upward. The first of them includes the results of a centralized analytical and synthetic processing of all published world and unpublished domestic literature on science and technology. The second stream is formed from unpublished documents that directly reflect the results of research and development work, best production practices, etc. This flow goes from the fourth level NTI bodies to the higher NTI bodies (central, sectoral, republican, all-union), where it is processed and included, as already mentioned, in the downward flow, which consists of secondary documents formed into information publications.

Secondary documents differ both in the nature of the information and in their intended purpose. These differences serve as the basis for identifying types of information publications. In general, an information publication is understood as a publication that contains systematized information about published and unpublished works in a form convenient for quick reference, published by scientific and technical information bodies, as well as other organizations engaged in information activities. Depending on the nature of the information included and the intended purpose, information publications are divided into bibliographic, abstract and review.

Bibliographic publications include current, recommendatory retrospective bibliographic indexes. Abstract publications include abstract journals, abstract collections, express information and fact sheets. For review publications - a review on one issue, direction (mono-edition) and a collection of reviews.

The nature of information, the functional specificity of information publications and their consumer purpose must be taken into account, starting from the stage of planning the publishing activities of NTI bodies. In order to ensure the targeted release of information publications, their completeness and simultaneous differentiation in relevant scientific and technical areas, taking into account information needs, planning and coordination of publishing activities in the NTI system is carried out centrally by the State Committee on Science and Technology.

The plans of the all-Union NTI bodies provide for the release of current bibliographic indexes on published sources of wide circulation (books, journals, patents, standards, etc.), indexes of deposited works, abstract journals and collections, express information, as well as review publications.

UNTICs provide for the publication of current bibliographic indexes on unpublished and departmental materials, retrospective and recommendatory indexes, scientific and technical abstract collections, express information and analytical reviews.

Republican information institutes include in the draft plan current bibliographic indexes reflecting the republican fund of documents; indexes of introduced and recommended inventions; retrospective bibliographic indexes; abstract collections in the national language based on upstream materials; review publications.

When considering plans, attention is paid to ensuring that there is no parallelism or duplication of materials in publications of various bodies, so that scientifically and practically valuable sources and information are reflected; An important requirement is the economical use of paper and the reduction of publication costs.

The organization and forms of editorial and publishing work in SSNTI do not have a common basis and are diverse. Many factors influence the solution to this issue: the type of information publication; the place and role in the NTI system of the information body that prepares and publishes publications (all-Union, central, industry, republican); who performs the functions of the editor (for example, the role of a scientific editor in the NTI system is often performed by an employee of a specialized unit); where the original information publication is prepared (directly in the NTI body or at any enterprise in the serviced industry); is the production (printing) division included in RIO, etc. There is no uniform procedure for evaluating handwritten material. Typically, NTI bodies limit themselves to an internal working assessment of materials being prepared for publication. Such an assessment may include preliminary and final decisions. The preliminary decision, as a rule, prepared by the editor, boils down to the following: recognize the original (manuscript) as suitable for publication, return it for revision (to the compiler, referee), send it for review to a specialized unit, submit it for discussion by management or the editorial board. The final decision on the release of an information publication should be made on the basis of official collective discussion among specialists (on the editorial board, editorial board, etc.).

External assessment in the form of reviewing is usually applied to review publications. However, this is done in cases where it is not possible to limit ourselves to the assessment of specialists within the information body.

When working on an information publication, the editor follows the general principles of the theory and practice of editing, achieving its ideological, scientific, informational and literary unity.

Scientific and technical information, as a social phenomenon, inevitably bears the imprint of the politics and ideology of the ruling classes. Therefore, the editor needs to rely on critical analysis, assessing the information provided from the standpoint of public information needs determined by the tasks of communist construction. Critical Approach is based on party integrity, deep ideological conviction, and the ability to apply the provisions of Marxist-Leninist teaching to analyze the content of an information document.

Annotation: The lecture provides basic concepts in the field of technical information security.

Therefore, in general, information is knowledge in the broadest sense of the word. That is, this is not only educational or scientific knowledge, but any information and data that is present everywhere. Confidential information and classified information, which relates to state secret. Under confidential information implied information limited access , not containing state secret.

In general data protection represents a confrontation between information security specialists and attackers. Intruder is an entity that illegally tries to obtain, change or destroy the information of legitimate users.

Data protection is poorly formalized task, that is, it has no formal solution methods, and is characterized by the following:

  • a large number of factors influencing the construction of effective protection;
  • lack of accurate initial input data;
  • lack of mathematical methods for obtaining optimal results from a set of initial data.

The basis for solving weakly formalizable problems is systems approach. That is, to solve the problem of information security, it is necessary to build an information security system, which is a set of elements whose functioning is aimed at ensuring information security. The inputs of any system are influences that change state of the system. For an information security system, the inputs are threats, both internal and external. Information security threat- a set of conditions and factors that create a potential or actual danger of violation information security. Attack an attempt to implement a threat is called, and the one who makes such an attempt is called an attacker. Source of information security threat- subject ( individual, material object or physical phenomenon) that is the direct cause of the threat information security . Sources of threats there may be intruders, technical means within the organization, employees of the organization, collateral physical phenomena etc. System outputs are the system’s reactions to various input values. The outputs of the information security system are security measures. The parameters of the information security system include the following:

  • goals and objectives;
  • system inputs and outputs;
  • processes within a system that transform inputs into outputs.

Target- this is the desired result of building a protection system; tasks are what needs to be done to achieve the goal. The purpose of information protection is to ensure information security. The concept of information security is no less multifaceted than the concept of information itself, and depends on the context in which it is applied. During this course under information security we will understand the security of information from accidental or intentional impacts of a natural or artificial nature that may cause unacceptable damage subjects of information relations, including owners and users of information and supporting infrastructure. That is, information security is the security of not only information, but also supporting infrastructure. If we consider only information, then information security- the state of information security, in which it is ensured confidentiality, availability and integrity.

Confidentiality, Availability and Integrity are the three most important properties of information to ensure its safety:

  • confidentiality of information- the state of information in which access to it is carried out only by subjects who have the right to it;
  • information integrity- a state of information in which there is no change in it or the change is carried out only intentionally by subjects who have the right to it;
  • availability of information- a state of information in which subjects with access rights can exercise them without hindrance.

Access rights include: the right to read, change, copy, destroy information, as well as the right to change, use, destroy resources.

The purposes of information protection are listed in more detail in the Federal Law “On Information, Informatization and Information Protection”:

  • prevention of leakage, theft, loss, distortion, falsification of information;
  • prevention security threats individuals, society, state;
  • prevention of unauthorized actions to destroy, modify, distort, copy, block information; preventing other forms of unlawful interference in informational resources and information systems, ensuring the legal regime of documented information as an object of property;
  • protection of the constitutional rights of citizens to maintain personal privacy and confidentiality personal data available in information systems Oh;
  • maintaining state secrets, confidentiality of documented information in accordance with the law;
  • ensuring the rights of subjects in information processes and in the development, production and use of information systems, technologies and means of supporting them

It is important to understand that an information security system cannot provide 100% protection. A certain level of information security is set, which reflects the acceptable risk of its theft, destruction or modification.

All information protection measures according to the methods of implementation are divided into:

  • legal (legislative);
  • moral and ethical;
  • technological;
  • organizational (administrative and procedural);
  • physical;
  • technical (hardware and software).

Among the listed types of protection, the basic ones are legal, organizational and technical. data protection.

Legal protection - data protection legal methods, including the development of legislative and regulatory legal documents (acts) regulating the relations of subjects on the protection of information, the application of these documents (acts), as well as supervision and control over their implementation. Legal protection measures include laws of the Russian Federation, decrees and other regulations. At the legislative level, the rules for handling information are regulated, the participants in information relations, their rights and obligations, as well as responsibility in case of violation of legal requirements are determined. In some ways, this group of measures can be classified as preventive. Their main function is to forestall potential attackers, because in most cases it is the fear of punishment that stops them from committing a crime. The advantages of legal protection measures are their versatility in terms of application to all methods of illegal extraction of information. Moreover, in some cases they are the only applicable ones, as, for example, when protecting copyright in the case of illegal reproduction.

TO moral and ethical measures include established norms of behavior in society. IN in some cases they can be formalized in writing, for example, by the charter or code of honor of the organization. Compliance with moral and ethical standards is not mandatory and is rather preventive in nature.

Organizational protection measures– measures of an organizational nature intended to regulate the functioning of information systems, the work of personnel, and the interaction of users with the system. Among the basic organizational measures

KHOREV Anatoly Anatolyevich, doctor technical sciences, Professor

Technical channels for the leakage of information processed by technical means.

This publication opens a series of articles that make up the journal version of A.A. Khorev’s book. “Protection of information from leakage through technical channels.”

General characteristics of technical channels of information leakage

The current stage of development of society is characterized by the increasing role information sphere, which is a collection of information, information infrastructure, entities collecting, generating, distributing and using information.

Information usually means information about persons, objects, facts, events, phenomena and processes, regardless of the form of their presentation.

TO protected information refers to information that is proprietary and subject to protection in accordance with the requirements of legal documents or requirements established by the owner of the information. This is usually restricted information , containing information classified as state secrets, as well as information of a confidential nature.

The set of operations of collection, accumulation, input, output, reception, transmission, recording, storage, registration, destruction, transformation and display of information is often called a general term data processing .

To technical means of transmission, processing, storage and display of restricted access information (TSPI) include: technical means of automated control systems, electronic computers and their individual elements, hereinafter referred to as computer technology (CT); means of production and reproduction of documents; sound amplification, sound recording, sound reproduction and simultaneous translation equipment; indoor television systems; video recording and video playback systems; operational command communication systems; internal automatic telephone communication systems, including connecting lines of the equipment listed above, etc. These technical means and systems are in some cases referred to as basic technical means and systems (OTSS).

The totality of information processing tools and systems, as well as premises or objects (buildings, structures, technical means) in which they are installed, is TSPI object , which in some documents is called object of informatization .

Along with technical means and systems that process restricted access information, TSPI facilities are also installed auxiliary technical means and systems(VTSS), not directly involved in its processing. These include: systems and means of urban automatic telephone communication; systems and means of data transmission in the radio communication system; systems and means of security and fire alarm; systems and means of warning and alarm; control and measuring equipment; air conditioning systems and means; systems and means of a wired radio broadcast network and reception of radio and television programs (subscriber loudspeakers, radio broadcasting equipment; televisions and radios, etc.); electronic office equipment; electrical clock systems and means and other technical means and systems. In some documents VTSS are called means of providing information object .

The power supply of TSPI and VTSS is usually carried out from distribution devices and power panels, which are connected with special cables to the transformer substation of the city electrical network.

All technical equipment and systems powered from the electrical network must be grounded. A typical grounding system includes a common ground electrode, a grounding cable, busbars and wires connecting the ground electrode to technical equipment.

As a rule, wires and cables that are not related to TSPI and VTSS, as well as metal pipes of heating systems, water supply and other conductive metal structures, which are called outside conductors .

A number of VTSS connecting lines, as well as extraneous conductors, may extend beyond the boundaries of not only the TSPI facility, but also controlled area (CR) , which is understood as a space (territory, building, part of a building) in which the uncontrolled presence of employees and visitors of the organization, as well as vehicles, is excluded. The border of the controlled zone may be the perimeter of the organization’s protected territory, as well as the enclosing structures of the protected building or the protected part of the building, if it is located in an unprotected area.

Thus, when considering a TSPI object as an exploration object, it must be considered as a system that includes:

Technical means and systems that directly process restricted access information, together with their connecting lines (connecting lines are understood as a set of wires and cables laid between individual TSPI and their elements);
- auxiliary technical means and systems along with their connecting lines;
- foreign conductors;
- facility power supply system;
- facility grounding system.

To obtain information processed by technical means, the “enemy” (a person or group of people interested in obtaining this information) can use a wide arsenal of portable technical reconnaissance equipment (TCR).

The combination of an intelligence object (in this case, a TSPI object), a technical intelligence means with the help of which information is obtained, and the physical environment in which the information signal is propagated is called technical channel of information leakage (rice. 1) .


Rice. 1. Diagram of a technical information leakage channel

During the operation of technical equipment, informative electromagnetic radiation occurs, and interference from information signals may appear in the connecting lines of high-voltage communication systems and extraneous conductors. Therefore, technical channels of information leakage can be divided into electromagnetic and electrical .

Electromagnetic channels of information leakage

In electromagnetic information leakage channels, the information carrier is various types collateral electromagnetic radiation (PEMR) arising during the operation of technical means, namely:

    spurious electromagnetic radiation arising from the flow of alternating current through the TSPI elements and their connecting lines electric current;

    spurious electromagnetic radiation at the operating frequencies of high-frequency generators that are part of the TSPI;

Side electromagnetic radiation from TSPI elements.

In some TSPI (for example, sound reinforcement systems), the information carrier is an electric current, the parameters of which (current strength, voltage, frequency and phase) change according to the law of changes in the information speech signal. When electric current flows through the current-carrying elements of the TSPI and their connecting lines, an alternating electric and magnetic field arises in the space surrounding them. Because of this, TSPI elements can be considered as emitters of an electromagnetic field modulated according to the law of change in the information signal.

Extraneous electromagnetic radiation at the operating frequencies of high-frequency TSPI generators.

The TSPI may include various types of high-frequency generators. Such devices include: master oscillators, clock frequency generators, erasing and magnetization generators for tape recorders, local oscillators of radio and television devices, generators of measuring instruments, etc.

As a result external influences information signal (for example, electromagnetic oscillations), electrical signals are induced on the elements of high-frequency generators. The magnetic field receiver can be inductors of oscillatory circuits, chokes in power supply circuits, etc. The receiver of the electric field is the wires of high-frequency circuits and other elements. Induced electrical signals can cause unintentional modulation of the generators' own high-frequency oscillations, which are radiated into the surrounding space.

Extraneous electromagnetic radiation occurs during the following modes of information processing by means of computer technology:

Displaying information on the monitor screen;
- data entry from the keyboard;
- recording information onto magnetic storage devices;
- reading information from magnetic storage devices;
- data transmission to communication channels;
- data output to peripheral printing devices - printers, plotters;-
recording data from the scanner to magnetic media (RAM).

To intercept collateral electromagnetic radiation from TSPI, the “enemy” can use both conventional radio and electronic reconnaissance means and special means reconnaissance, which are called technical means of reconnaissance of side electromagnetic radiation and interference (TSR PEMIN). As a rule, it is assumed that PEMIN TSRs are located outside the controlled area of ​​the facility.

The quality of signal detection by a reconnaissance tool is characterized by the probabilities of correct detection P o signal and false alarm P Lt. It is usually assumed that reconnaissance equipment uses receiving devices that are optimal for the types of signals being intercepted. Most often, they implement a signal processing algorithm according to the Neyman-Pearson criterion, which minimizes the probability of a type 2 error (missing a signal), provided that the probability of a type 1 error (false alarm) is no more than a certain specified value. The most common type of interference is the internal noise of the receiving device, which is added to the received signal (additive noise). Knowing the noise level of the receiving device, it is easy to calculate the signal level at the input of the receiving device, at which the probability of its correct detection will be equal to a certain permissible (normalized) value R o.additional, which is usually called the receiver sensitivity U rpm.

To ensure the required level of information protection, the permissible value of the probability of correct signal detection is usually R o.add =0.1-0.7 with the possibility of a false alarm R lt =10 -3.

Using the characteristics of the receiving device and the antenna system of the reconnaissance device, it is possible to calculate the permissible (normalized) value of the electromagnetic field strength at the point where the reconnaissance device is located, at which the “information signal/interference” ratio at the input of the receiving device will be equal to a certain (normalized) value, at which it is possible either to detect information signals with the required probability by means of reconnaissance, or to measure their parameters with acceptable errors, and therefore to isolate useful information.

The space around the TSPI, within which the electromagnetic field strength exceeds the permissible (normalized) value, is called zone 2 (R2). In fact, the R2 zone is the zone within which it is possible for reconnaissance equipment to intercept TSPI spurious electromagnetic radiation with the required quality ( rice. 2).


Rice. 2. Interception of spurious electromagnetic radiation from TSPI
PEMIN intelligence means

Zone 2 for each TSPI is determined by the instrumental-calculation method when conducting special studies of technical equipment at PEMIN and is indicated in the instructions for their operation or certificate of conformity.

Thus, through electromagnetic channels of information leakage, interception of information can be carried out by receiving and detecting by means of reconnaissance side electromagnetic radiation arising during the operation of the TSPI.

Along with passive methods of intercepting information processed by TSPI and discussed above, it is also possible to use active methods, in particular, the method “high frequency irradiation” (rice. 3), in which the TSPI is irradiated with a powerful high-frequency harmonic signal (for these purposes, a high-frequency generator with a directional antenna having a narrow radiation pattern is used). When the irradiating electromagnetic field interacts with the TSPI elements, its re-emission occurs. On the nonlinear elements of the TSPI, modulation of the secondary radiation by an information signal occurs. The re-emitted signal is received by the reconnaissance device's receiving device and detected.


Rice. 3. Interception of information processed by TSPI,
by “high-frequency irradiation” method

To intercept information processed by TSPI, it is also possible to use electronic devices interception of information ( embedded devices), secretly introduced into technical means and systems ( rice. 4). They are miniature transmitters, the radiation of the master oscillators of which is modulated by an information signal. Information intercepted using embedded devices is either directly transmitted over a radio channel, or is first recorded in a special storage device, and only then, upon a control command, is transmitted over a radio channel.

The installation of embedded devices in TSPI of foreign manufacture is most likely.


Rice. 4. Interception of information processed by TSPI,
by installing embedded devices in them

Electrical information leakage channels

The causes of electrical information leakage channels may be:

Galvanic connections of TSPI connecting lines with VTSS lines and extraneous conductors;
- interference of spurious electromagnetic radiation of TSPI on connecting lines of VTSS and foreign conductors;
- interference of spurious electromagnetic radiation of the TSPI on the power supply and grounding circuits of the TSPI;
- “leakage” of information signals into the power supply and grounding circuits of the TSPI;
- “leakage” of information signals into the TSPI grounding circuit.

Inductions (currents and voltages) in conductive elements are caused by electromagnetic radiation from TSPI (including their connecting lines), as well as capacitive and inductive connections between them. VTSS connecting lines or extraneous conductors are like random antennas, when galvanically connected to which PEMIN reconnaissance equipment can intercept information signals induced into them ( rice. 5).


Rice. 5. Interception of induced electromagnetic radiation by TSPI
from extraneous conductors (engineering communications)

Random antennas can be concentrated or distributed. Focused random antenna is a compact technical device (for example, telephone set, radio broadcast network loudspeaker, fire alarm sensor, etc.) connected to a line extending beyond the controlled area. TO distributed random antennas include random antennas with distributed parameters: cables, wires, metal pipes and other conductive communications that extend beyond the controlled area. The level of signals induced in them largely depends not only on the power of the emitted signals, but also on the distance from the TSPI lines to the HTSS lines or foreign conductors, as well as the length of their combined path.

When propagating through a random antenna, the induced information signal attenuates. The attenuation coefficient of the information signal can be calculated by knowing the distance from the place of possible connection of the TSR to a random antenna to the TSPI object and the frequency of side electromagnetic radiation. With a known attenuation coefficient, it is easy to calculate the value of the induced information signal in a random antenna, at which, at the input of the receiving device of the reconnaissance device, the level of the information signal will be equal to a certain threshold (normalized) value, at which the probability of its correct detection will be equal to the required value R o.additional.

The space around the TSPI, within which the level of the informative signal induced from the TSPI in concentrated antennas exceeds the permissible (normalized) value is called zone 1 (r1), and in distributed antennas – zone 1 * (r1 *).

Unlike zone R2, the size of zone r1 (r1 *) depends not only on the level of spurious electromagnetic radiation from the TSPI, but also on the length of the random antenna (from the room in which the TSPI is installed to the place where reconnaissance equipment can be connected to it).

Zones r1 (r1 *) for each TSPI are determined by the instrumental-calculation method when conducting special studies of technical equipment at PEMIN and are indicated in the instructions for their operation or certificate of conformity.

“Leakage” of information signals in the grounding circuit. In addition to the grounding conductors, which serve to directly connect the TSPI to the grounding loop, various conductors extending beyond the controlled area can have a galvanic connection with the ground. These include the neutral wire of the power supply network, screens (metal shells) of connecting cables, metal pipes of heating and water supply systems, metal reinforcement of reinforced concrete structures, etc. All these conductors, together with the grounding device, form an extensive grounding system to which information signals can be induced. In addition, an electromagnetic field appears in the soil around the grounding device, which is also a source of information.

Interception of information signals in power supply lines and TSPI grounding circuits is possible by galvanically connecting the PEMIN reconnaissance equipment to them ( rice. 6).


Rice. 6. Interception of information signals from the power supply and grounding circuits of the TSPI

Thus, interception of information processed by technical means can be carried out by ( rice. 7):

Interception of side electromagnetic radiation arising during the operation of technical equipment;
- interception of information signal interference from VTSS connecting lines and foreign conductors;
- interception of information signals from power supply and grounding lines of TSPI;
- “high-frequency irradiation” TSPI;
- introduction of embedded devices into TSPI. Fig. 7. Classification of methods for intercepting information processed by technical means

Literature

1. GOST R 51275-99. Data protection. Information object. Factors influencing information. General provisions. (Adopted and put into effect by Resolution of the State Standard of Russia dated May 12, 1999 No. 160).
2. Information security doctrine Russian Federation(Adopted September 9, 2000 No. PR-1895).
3. Terminology in the field of information security: Directory. M.: VNII Standard, 1993. 110 p.
4. Khorev A.A. Protection of information from leakage through technical channels. Part 1. Technical channels of information leakage. M.: State Technical Commission of the Russian Federation, 1998. 320 p.

A characteristic feature of the development of modern science is the rapid flow of new scientific data obtained as a result of research. More than 500 thousand books on various issues are published around the world every year. Even more magazines are being published. But despite this, a huge amount of scientific and technical information remains unpublished.

Information has the property of "aging". This is due to the emergence of new printed and unpublished information or a decrease in the need for this information. According to foreign data, the rate of decline in the value of information (“aging”) is approximately 10% per day for newspapers, 10% per month for magazines and 10% per year for books.

Thus, finding a new, advanced, scientific solution to this topic is a difficult task not only for one scientist, but also for a large team.

Insufficient use of global information leads to duplication of research. The amount of re-obtained data reaches 60 and even 80% in various fields of scientific and technical creativity. And these are losses that in the United States, for example, are estimated at many billions of dollars annually.

Each step on the path of scientific progress is achieved with more and more difficulty, at an ever more expensive price. Over the past four decades, a two- to three-fold increase in the amount of new scientific data has been accompanied in the world by an eight- to ten-fold increase in the volume of printed and handwritten information, a fifteen- to twenty-fold increase in the number of people in science, and a more than hundred-fold increase in allocations for science and for the development of its results.

To speed up the selection of the necessary documentation from the total volume and increase the efficiency of workers, a national scientific and technical information service (NTI) has been created in Ukraine.

The national service includes industry information centers - the Republican Institute of NTI, information centers, NTI departments (ONTI) in research institutes, design bureaus, and enterprises.

Information carriers can be various documents:

· books (textbooks, teaching aids, monographs);

· periodicals (magazines, bulletins, works of institutes, scientific collections);

· regulatory documents (standards, SNIPs, technical specifications, instructions, temporary instructions, regulatory tables, etc.);

· catalogs and price lists;

· patent documentation (patents, inventions);

· reports on research and development work;

· information publications (NTI collections, analytical reviews, information leaflets, express information, exhibition brochures, etc.);

· translations of foreign scientific and technical literature;

· materials of scientific, technical and production meetings;


· production and technical documentation of organizations (reports, work acceptance certificates, etc.);

· secondary documents (abstract reviews, bibliographic catalogs, abstract journals, etc.).

These documents create huge information flows, the rate of which is increasing annually.

There are upward and downward flows of information.

Upward is the flow of information from users to registration authorities. All scientific and technical information is registered at the Republican Institute of Scientific and Technical Information.

The executor of scientific and technical work (research institutes, universities, etc.), after approval of the work plan, is obliged to submit an information card to the Republican Institute of Scientific and Technical Information within a month. Upstream also includes articles submitted to various journals.

Downward is the flow of information in the form of bibliographic reviews, abstracts and other data, which is sent to grassroots organizations upon their requests.

The collection, storage and issuance of information is carried out by reference and information funds (RIF). The country has sectoral, republican and local (in research institutes, universities, design bureaus, etc.) SIF.

The SIF establishes a certain procedure for storing information. There are main and reference funds.

The fixed assets (books, magazines, translations, reports, etc.) are placed on shelves in alphabetical order by type of information. Dissertations, reports, project materials and other bulky documents are microfiltered with a reduction of 200 times or more. A report or dissertation of up to 150 pages is placed in a container with a diameter of 35 mm. Micro cards (105x148 mm) are also convenient. One map contains more than 80 pages of text.

The reference fund is secondary information documents of the main fund. It is represented mainly by bibliographic and abstract cards (125x75 mm), stored in catalog drawers.

The reference fund consists of the main card index (containing all published and unpublished documents stored in this SIF), catalogs and cards.

Using the alphabetical catalogue, you can find any information in this CIF by the name of the author, editor or by the title of the original source.

Using a systematic catalog, you can select information for various fields of knowledge. To speed up the search necessary information The catalog is accompanied by a key - an alphabetical index.

The registration card file of periodicals contains information about magazines, collections, bulletins stored in this CIF (by year and number).

The standards file contains various regulatory documents - standards, norms, specifications, temporary instructions, etc.

Finding the necessary information becomes more difficult every year. Therefore, all scientists should know the basic principles associated with information retrieval.

Information search is a set of operations aimed at finding documents that are necessary to develop a topic. The search can be manual (carried out using ordinary bibliographic cards, card indexes, printed indexes), mechanical (the information carrier is punched cards), mechanized (based on the use of counting and punching machines) and automated (using a computer).

Information retrieval is carried out using an information retrieval language (IRL) - a semantic (notional) system of symbols and rules for their combination. In the information retrieval system, various options for IPL are used. Currently, the most widespread is the universal decimal classification of information documents (UDC).

The UDC divides all areas of knowledge into ten departments, each of which is divided into ten subsections, and a subsection into ten parts. Each part is detailed to the required degree. The structure of the UDC consists of groups of main indices and determinants. Groups are divided into subgroups of general and special determinants.

UDC is easily understood by employees of publishing houses and libraries, is conveniently encrypted, and has relatively quick search information for highly specialized topics.

In recent years, mechanized and automated search systems have been increasingly used, which eliminate the cumbersome nature of the UDC system.

Page
3

Technological information- this is information about the processes that determine the quality of organization, enterprise management and implementation of production, commercial or other activities, about technological advances that provide certain advantages in competition. Quality criteria can include, in particular, the speed of concluding and implementing transactions, the controllability of the company’s personnel, and the consumer properties of products and services.

Technological information may relate to the field of management, marketing, forms and methods of financial management, production, as well as to the processes that determine set level business security.

In the scientific, technical and industrial fields this should include a description technological processes, methods, technological modes that determine the given level of quality of products manufactured by the enterprise, economical use Supplies, minimal energy consumption, increased speed of technological processes, as well as compliance with environmental safety requirements.

This refers to technological processes that play a decisive role in terms of quality at all stages of design, creation, production and disposal of a product, as well as waste disposal. Obtaining unauthorized access to technological information allows a competing enterprise to independently repeat these processes without the owner’s permission.

Promising technologies, technological processes, techniques, and equipment can also be considered here.

Parametric characteristic information- these are quantitative parameters of the organization, management and implementation of business activities, according to which the enterprise has an advantage over its competitors. This type of trade secret includes comparative calculations of the effectiveness of implementing various options for entrepreneurial projects. In the field of finance, this is the price structure for products, internal price lists and tariffs, data on product costs, calculation of production costs, information on discounts provided, etc.

This type of information, as it relates to scientific and technical products, includes weight and size characteristics of products, space-time and other indicators of technological processes, parameters for the manufacture and processing of workpieces (cutting, milling, etc.), the course of physical, chemical and other processes .

Rice. 2. Main objects of the business security information base

Operating Information is a description of preventive, repair and other procedures necessary for the most efficient operation of equipment, machinery and mechanisms or other products, as well as procedures for the liquidation and disposal of products, allowing them to be repeated with the same effect without the permission of the owner of the information. This also includes methodological issues of using and managing the security system.

For conceptual, organizational, technological, characteristic and operational types of trade secrets, the fundamental approach to ensuring its economic and information security from unauthorized access is different. Identification of these types of secrets facilitates its identification, development of effective protection measures, analysis of the causes and localization of the consequences of information leakage.

In a generalized form, the main objects of the business security information base are presented in Fig. 2.

The sources and carriers of information constituting a trade secret include: employees of the enterprise; official printed documents; technical storage media; computer, organizational and other equipment; samples of the company's products that are in the development or preparation stage for production; industrial waste; open publications.

The value of the information that an employee has, as a rule, is directly proportional to his official position. It is in the worker's brain that the know-how is contained. At the same time, an employee can also act as a subject who has unauthorized access to a trade secret, creating conditions for its leakage due to malicious intent or negligence.

Some types of information that usually constitute a trade secret (plans, statistics, contracts with partners), the main objects of analysis of corporate identity are: a program for creating a corporate identity; degree (level) of corporate identity development; the carrier material from which products representing the corporate identity are made; corporate expectations that must be taken into account in the process of partnership interaction: financing, diversification, structural restructuring, reducing the tax burden, solving functional problems, ensuring security, increasing profits.

IN Lately industrial espionage is acquiring increasingly global features. In April 1993, a representative of the CIA headquarters, L. Christchen, in an interview with Fortune magazine, noted that American intelligence was shifting the main focus of its activities from the military-political sphere to the sphere of global business. At the same time, American intelligence services are charged with not only penetrating macroeconomic secrets (advanced technologies, the state of energy and raw materials resources of foreign countries), but also collecting information in the interests of American corporations, which provide them with advantages in the fight against foreign competitors.

The German manufacturer of wind power generators Enercon became a victim of the Echelon satellite information interception system. His research laboratories developed new technology, which made it possible to obtain electricity using wind energy much cheaper than before. But when the company tried to market its products in the United States, it encountered American competitor Kenetech, which said it had patented an almost identical design. The case ended in a very significant way: Kenetek sued Enercon, obtaining a ban on the sale of its products in the United States.

The situation with the purity of Kenetek's "patents" became clearer when an unnamed US National Security Agency official admitted in an interview with German television that the line of communication between the Enercon research laboratory, located on the North Sea coast, and the company's production division, located about 25 kilometers, monitored using satellites. And then all the data received about these developments was transferred to the NSA Kenetek.