THE PROBLEM OF GENERAL ANALYSIS OF INFORMATION PROTECTION IN THE INFORMATION SYSTEM

Authors: D. Bashygyzy
Affiliation: Senior Lector, NAO Caspian University of Technology and Engineering named after Sh. Yessenova, Aktau, Kazakhstan

Category:

Keywords: information system, file, program, component, personal
ABSTRACT. All programs are protected from unauthorized copying if a copy of the program is executed in it, which allows you to check the program itself in order to determine whether it was created in compliance with all the necessary technologies. The program cannot work normally if the copying technology is violated. Thus, legal copying involves some unique copying technology. Any copy or internal file of a protected program must have a "key" - one or several code digits. When checking, the program compares a number of specific features of the working environment with a pre-encoded key and, based on the results of the comparison, forms the corresponding sign. Thus, the creation of a copy of the program is minimal: this copy must provide a dongle ready to work with a real computer in order to be functional.

References:

1.Айтхожаева Е.Ж., И Син Фу Е.В. Язык программирования баз данных xBase. /Методические указания к лабораторным работам по дисциплинам «Системы баз данных», «Базы данных». / - Алматы: КазНТУ, 2006.
2.Айтхожаева Е.Ж., И Син Фу Е.В. Визуальное проектирование компонентов систем баз данных. /Методические указания к лабораторным работам по дисциплинам «Системы баз данных», «Базы данных». / - Алматы: КазНТУ, 2004.
3.Айтхожаева Е.Ж., Дрогнова Н.Ф., И Син Фу Е.В. Разработка приложений баз данных. /Методические указания к курсовой работе/ - Алматы: КазНТУ, 2005.
4.Sergiy Gnatyuk , Maksim Iavich , Giorgi Iashvili , Andriy Fesenko ENSURING EUROPEAN CIVIL AVIATION CYBERSECURITY, Scientific and practical cyber security journal, 2019
5.Maksim Iavich, Sergiy Gnatyuk, Giorgi Iashvili, Andriy Fesenko, Cyber security European standards in business, Scientific and practical cyber security journal, 2019