The ability to manage the security of information using the...

Information security management capabilities with the help of the operating system and Microsoft Office 2010 applications

Operating systems provide the following security features:

• recovery of processes after failures and errors;

• Data backup;

• delineation of the powers of users;

• Controlled logon to the system;

• control access to the information network.

Operating systems allow to achieve a high level of system stability to failures, erroneous actions of operators and other negative events. In this case, it is possible to restore the data and return to the execution of application programs from the point of the computing process in which the normal operation of the computer interrupted.

Standard OS facilities allow you to maintain a controlled logon mode using the parodying subsystem. Different users of the computer have different powers to manage the OS.

When you connect your computer to the Internet or a local network, the OS interacts with the built-in programs - firewall and browser (can use and programs that are not integrated with the OS). The main purpose of Windows Firewall is to filter incoming traffic. The program skips or blocks messages coming from the network to the computer, in accordance with the user-configured firewall settings. The program allows you to log, recording in pego allowed and blocked attempts to connect to the computer.

A browser program, or a browser (for example, Internet Explorer), provides the user with a wide range of options to perform security and privacy settings when using the Internet. For beginners, the default settings are settings close to the average level. Depending on the requirements for security and privacy, the user can increase or decrease the protection level of the computer. The program allows you to use either standard balanced settings for each level of security (low, medium, high, ...), or independently configure individual security settings.

Internet Explorer allows you to restrict access to unwanted information (scenes of violence, discrimination, profanity, etc.) and to certain sites.

Internet Explorer supports SSL or TLS cryptographic protocols that provide encryption of transmitted information using a public key cryptosystem.

In MS Office 2010 applications, a number of data protection mechanisms are implemented:

• file encryption;

• use of an electronic signature;

• Restrict editing of files.

MS Office 2010 application files are protected against unauthorized use of encryption. By default, an AES cryptosystem with a 128-bit key is used. This procedure is called encrypt with a password & quot ;.

An electronic signature is used to control the integrity and authorization of Word, Excel and PowerPoint files. To work with an electronic signature, you must have a certificate obtained from the certification authority. If the certificate from the certification authority is not received, then it is possible to create your own certificate. Such a certificate is not certified by a trusted certification authority, and it can not be used to confirm the authorship of the document. A personal certificate only allows you to check the integrity of files on the user's computer.

In the MS Word document, restrictions on formatting and editing can be set. In MS Excel, you can protect a book and a sheet from unauthorized changes. Protection against changes does not ensure data confidentiality, as encryption is not performed.

Protecting the book allows you to keep the structure of the book unchanged. Sheet protection provides the blocking of all actions for editing data on a sheet, except for actions in relation to certain blocks of cells that are directly specified during the process of setting sheet protection.

Thus, the modern versions of Windows and MS Office applications have built-in mechanisms for ensuring information security. The user can customize them according to the chosen security policy.

Also We Can Offer!

Other services that we offer

If you don’t see the necessary subject, paper type, or topic in our list of available services and examples, don’t worry! We have a number of other academic disciplines to suit the needs of anyone who visits this website looking for help.

How to ...

We made your life easier with putting together a big number of articles and guidelines on how to plan and write different types of assignments (Essay, Research Paper, Dissertation etc)