X hits on this document





10 / 13

study of problems of creation of  the a uniform national system  to notify governmental, commercial and non-commercial organizations, as well as individual computer users about the appearance of new information security threats.

   The educational activity should be carried out widely and on a permanent basis, as only in this case it is possible to ensure an adequate response to the appearance of new information security threats.

2.4. the Tasks of HARDWARE developers

The  protection against malicious programs and spam requires the following steps from hardware developers:

the constant development of means of protection against malicious programs and spam, and tracking of current trends in this area;

the participation in elaborating an agreed set of requirements for means of protection against malicious programs and criteria for their objective testing;

ensuring a possibility of an attractive financial model to implement and support means to protect against malicious programs and spam;

extending comprehensive assistance to carry out educational activity aimed at improving the professional skill of the technical experts and principals  in the area of protection against malicious programs and spam;

the active participation in the development of regulations which promote the development of effective and documents consistent regulations on computer technologies.

2.5. The tasks of system integrators

   The system integrators create information security support systems based on a set of separate information protection resources and support the proposed solutions at  the stage of their operation. The tasks of the system integrators are as follows:

forming sets of standardized solutions providing the completeness and economic efficiency of measures to protect information in the infocommunication systems;

providing external monitoring of the infocommunication systems’ security level;

creation of quality requirements of the services provided, taking into account the application of resources to protect against malicious program and spam;

participation in elaborating the requirements for hardware protection manufacturers from the point of view of implementing the information safety system and its support in the process of operation;

participation in the organization of notification and warning systems about threats associated with use of malicious programs;

participation in the development of regulations.

The listed tasks determine the place of the system integrator as the connecting link between the developers of information protection hardware, operators, and infocommunication system users.

2.6. THE task of telecommunication operators

The telecommunication networks connect the owners of information systems and resources and constitute the main medium of malicious programs and spam distribution, therefore telecommunication operators should be actively involved in the process of counteracting malicious programs and the distribution of spam.

As operators can offer to users the services of one kind of telecommunication (telephone, telegraph, telemetry, data transmission etc.) or many services, including all their available varieties, the requirements for them to counteract malicious programs and spam distribution should differ as well.


Document info
Document views45
Page views45
Page last viewedSat Oct 22 04:03:05 UTC 2016