INTERACTION PROCESSING OF NODES IN VIPNET
Keywords:
information, data, computer, security, VPNAbstract
In the period of rapid development of technology, information security problems emerge most acutely. The use of automated information processing and management systems has increased the protection of information from unauthorized access. The main problems of information security in computer systems arise due to the fact that information is not strictly connected with mass media. It can be easily and quickly copied and transmitted over communication channels. The information system is exposed to both external and internal threats of intruders.The main problems of information security when working in computer networks can be divided into three types: • interception of information (violation of confidentiality of information), changing information (distorting the original message or replacing it with other information), change of authorship (theft of information and violation of copyright). Today, the protection of computer systems against unauthorized access is characterized by the increasing role of software and cryptographic mechanisms compared to hardware. New problems in the field of information security require the use of protocols and mechanisms with relatively high computational complexity. The solution to these problems is the creation of virtual private networks (VPN).