- •Ict subject and its objectives.
- •Ict Standards.
- •State standards of the Republic of Kazakhstan in the field of Informational technologies
- •List of recommended references
- •Introduction to the computer system.
- •Memory unit. The computer will have memory that can hold both data and also the program processing that data. In modern computers this memory is ram.
- •Input – Output. This architecture allows for the idea that a person needs to interact with the machine. Whatever values that are passed to and forth are stored once again in some internal registers.
- •Human-computer interaction
- •Interface Usability.
- •Common accessibility features
- •Advantages of a dbms
- •Types of databases
- •Data Analysis
- •The main methods of representations and processing of charts
- •Electronic spreadsheet ms Excel
- •Ms Excel functions for calculation
- •The main methods of representations and processing of charts
- •Intermediary Devices and their Role on the Network
- •Internetwork
- •Intranet
- •Internetwork Protocol:
- •Internet Connections
- •Ip stands for Internet Protocol
- •Definition of a communication device
- •Augmentative communication devices
- •Long distance communication devices
- •Voip based communication devices
- •Satellite phone communication devices
- •Related pages
- •Computer Network
- •Local and Wide Area Networks
- •Intranets and Extranets
- •The Internet
- •The Telephone Network in Computing
- •Industry cyber security.
- •Cyber Terrorism
- •Cyber Warfare
- •Cyber Espionage
- •Threats classification
- •Methods for Protection against Dangerous Electromagnetic Emissions
- •Dangerous Signals
- •Etsi Cyber Security Technical Committee (tc cyber)
- •Legal System of Kazakhstan
- •Electronic signature
- •Used literature
- •What is the web?
- •What is the function of server software / programs?
- •How does the web surfer find a web site?
- •Registering your domain name
- •What is the Internet?
- •What is the Web?
- •How does the Internet work?
- •Google accounts
- •Gmail features
- •Get to know the Gmail interface
- •What is the World Wide Web (www)?
- •Basic www Concepts
- •Domain Names and ip Addresses
- •Dns Servers
- •Security Concerns
- •Browsers
- •Programming Languages
- •Frameworks
- •Libraries
- •Databases
- •Data formats
- •What are smtp, pop3 and imap?
- •Examples
- •Cloud an d mobile technologies
- •Virtualization technologies.
- •Virtualization technologies
- •Isolation
- •Web Services and Cloud Computing
- •Cloud Computing Definition nist Definition of Cloud Computing
- •Cloud Computing Explained a Convergence of Technologies
- •Any Organization Can Use Cloud Computing
- •Blurring of Services
- •4G Networking[edit]
- •Operating systems[edit]
- •Channel hogging and file sharing[edit]
- •Future of smartphone[edit]
- •Comparison table[edit]
- •Internet of Things.
- •Smartphones
- •Smart Services
- •Big data
- •Teleconference Teleconference
- •Telemedicine
- •Information e-business infrastructure
- •Information technology in the professional sphere. Industrial ict.
- •Search Engines What is a search engine?
- •Why use a search engine?
- •How do I know when I should use a search engine and when I should use a database?
- •The prospects of ict development
- •Globalization Of App Developer Opportunities
Methods for Protection against Dangerous Electromagnetic Emissions
The problem of studying linear and other electric circuits of the cryptographic equipment is called forth by available principle possibility to restore keys or non-ciphered (clear) information as a result of intercept of its microtrace generated at the time of processing the above mentioned information in the components of the equipment. The subject of special examination also includes electromagnetic fields, channel circuits and outcoming wiring of the equipment in which researchers can find trace of key and clear information caused by the functioning of the internal components of the cryptographic equipment. For example, let's consider the output signal of the electronic cryptographic equipment – sequence of pulses representing abstract zeros and ones. In any electronic equipment such pulses are to comply with some standards so that they can be identified by the other parts of the system. In cryptography there are some additional requirements: pulses representing identical values must be identical as much as possible. Cryptographic equipment, like any other devices, is typical of electromagnetic emission caused by short pulses use. As any emission of a cryptographic device can be intercepted by adversaries and analyzed for obtaining useful information, there must be provided a protection against such attack, for example, by way of shielding units and blocks of the equipment. The first stage of shielding is intended to divide strictly the device into "red" (restricted) zone within which there is a plain text, and "black" (unrestricted) zone, within which there is only a ciphertext. The device must be designed so that all traffic lines between "red" and "black" zones be protected to provide passage of only designated information via them. The adversary can organize an active attack, directing emission of high energy at a communication terminal and monitoring the reaction, expecting to obtain any information on its internal state. The general attitude to estimating an extent of cryptographic equipment protection consists in selecting (on the basis of the analysis of proposed circuit designs) sources of dangerous signals, discovering, by experimental methods, among them the most informative ones and measuring the levels of dangerous signals from the selected sources through the leakage paths. Then a degree of informativeness is determined by calculating the signal-to-noise ratio at the output of the receiver under the conditions of operating masking noise and comparing the obtained data with the accepted values.
Dangerous Signals
A signal is considered as dangerous if processing it can result in developing effective algorithms of decryption (for example, ones reducing the key strength or restoring codes of special software) or restoring the information transmitted without identifying the key itself (sometimes even without knowing the algorithm of the equipment operation). The following is of interest of the ill-minded person: encryption (decryption) key; signals of intermediate information being individual for each key; key of digital signature creation; signals of clear information.
Cybersecurity standards (also styled cyber security standards)[1] are techniques generally set forth in published materials that attempt to protect the cyber environment of a user or organization.[2] This environment includes users themselves, networks, devices, all software, processes, information in storage or transit, applications, services, and systems that can be connected directly or indirectly to networks. The principal objective is to reduce the risks, including prevention or mitigation of cyber-attacks. These published materials consist of collections of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies.
Cybersecurity standards
Cybersecurity standards have existed over several decades as users and providers have collaborated in many domestic and international forums to effect the necessary capabilities, policies, and practices - generally emerging from work at the Stanford Consortium for Research on Information Security and Policy in the 1990s.[3] Also many tasks that were once carried out by hand are now carried out by computer; therefore there is a need for information assurance (IA) and security.
A 2016 US security framework adoption study reported that 70% of the surveyed organizations see the NIST Cybersecurity Framework as the most popular best practice for computer security, but many note that it requires significant investment.[4]
