Planning Motivation Control

Advertising means and peculiarities of their choice. Antihistamines: a list of medicines and features of their use. Benefits of Personal Selling

No single subject of advertising can afford to use all advertising media at the same time and distribute them on an unlimited scale. The success of an advertising message depends on where and when it is posted. Before choosing one or another type of advertising, it is necessary to determine the purpose of the advertising event. The goals can be very different, they depend on the idea of ​​the advertiser himself.

The first group includes goals that form the company's image. In this case, commercials in film and television, billboards, advertising in periodicals, on transport, etc. can be used.

The second group can include goals related to promotional advertising. Television and radio advertisements, exhibitions, advertisements in periodicals, direct mail, etc. are used as advertising media.

The third group is made up of goals that allow using advertising means to ensure stability, both in the sale of goods and in the attitude of consumers to the company. We use exhibitions, direct post mailing to regular partners, Hiden advertisment in the form of articles on the goods and activities of the company, etc.

The correct choice of advertising means is to select exactly those that allow you to solve this advertising goal most effectively. In order to rationally choose the channel for the distribution of advertising messages, special work is carried out analyzing the media channels according to the following criteria:

  • 1. coverage (that is, to what possible number of addressees it will be possible to convey the message under normal average conditions);
  • 2. availability (in other words, whether the company will be able to use these channels at any necessary time, and if not, how much the resulting restrictions will reduce the effectiveness of advertising);
  • 3. cost (total costs for one publication (transmission) of this advertising message, discounts for multiples, the cost of one advertising contract, taking into account the circulation (number of listeners, viewers));
  • 4. manageability (that is, whether the company will be able to transmit the message to the target group of influence that is needed via this channel);
  • 5. authority (how much this channel is respected by potential and current buyers);
  • 6.serviceability (i.e., is it necessary to provide an advertising message in absolutely finished form for printing (broadcast), or you can rely on professionals to perform text preparation, photography, etc.).
  • 1. Newspapers is an ideal advertising medium for a company that wants to have a wide range of clients. Newspapers allow you to convey specific information to customers, such as price, discounts, characteristics of the product being sold, etc.
  • - flexibility, timeliness, good coverage of the local market;
  • - widespread acceptance and acceptance;
  • - high reliability;
  • - it is easier and cheaper to place an ad than in other media, once you have made an original layout, you can use it many times.
  • - short duration of existence;
  • - low quality of perception;
  • - insignificant audience of "secondary" readers;
  • - the modern reader skims through articles and only briefly - advertising.
  • 2. Radio can be used by any company with a fairly wide range of consumers. The radio triggers an instant reaction to the advertised offer.
  • - gives good results even for a relatively small business;
  • - allows you to influence a specific type of audience;
  • - low cost;
  • - delivers advertising to people active, moving, which allows employees retail literally pull customers out of cars;
  • - it is easy to make changes both in the text of the advertisement and in the plan of its sounding on the air;
  • - The radio audience is usually somewhat younger than typical newspaper readers and therefore more willing to buy new products and services.
  • - some radio listeners switch receivers from one station to another every minute and especially do not like blocks of advertisements and announcements;
  • - if advertising market is large, airtime can be very expensive.
  • 3. TV is an ideal advertising tool for businesses that need to “show their product with their face”. Television advertising is the most effective advertising medium because it conveys visual images that are the most compelling and compelling possible.

Advantages of television:

  • - the only one among all media allows the advertiser to clothe their information in a form containing visual images, words and music;
  • - can show the viewer how he will feel after purchasing the offered product or service;
  • - people usually watch TV during leisure hours (especially in the evening);
  • - breadth of coverage;

Disadvantages of television:

  • - high absolute cost;
  • - overloaded with advertising;
  • - the fleetingness of an advertising contact;
  • - less selectivity of the audience;
  • - the development of cable television makes it difficult to choose a TV company;
  • - mistakes are very expensive.
  • 4. Mail advertising is called mailing brochures, letters, catalogs, postcards, etc., which should persuade the client to immediately purchase a product (service). Postal advertising is a tool for entrepreneurs who would like to convey their proposals to a certain circle of consumers. This is good way out for those whose product (service) cannot be described in 30 seconds (typical duration of a radio and television ad).
  • - allows you to convey both information to customers in the other hemisphere, and to be limited to your city;
  • - makes it possible to choose addressees;
  • - you can evaluate the effectiveness of the number of clients who have applied;
  • - despite the cost of production and mailing of promotional materials by mail, the number of orders justifies the costs;
  • - "urgent" messages are increasing;
  • - coupons sent by mail are much more effective than coupons published in the press.
  • - If you have not thoroughly researched your target market, a large percentage of sent out brochures will be wasted.
  • 5. Most famous magazines are addressed to a wide range of readers, but most of the magazines are addressed to very strictly defined groups of readers.

Advantages:

  • - delivers information to certain categories of the population, selected by demographic, professional or other criteria;
  • - the entire circulation is sold in your target market;
  • - allows you to influence feelings with color, interesting illustrations and text;

Flaws:

  • - each issue of the magazine takes a very long time to prepare;
  • - the prices are insanely high;
  • - your ad will compete with other ads.
  • 6. Point of Sale (POS) Advertising- these are advertising materials with the help of which you attract the attention of customers to your products. RMP are most often short slogans reflecting the distinctive features of your products (services).

Advantages:

  • - clearly visible and effective, attracts the eye of the client at the point of sale;
  • - relatively inexpensive.

Flaws:

  • - performance may be impaired if many competing PMA materials are placed in the same location (eg a shop window).
  • 7. Outdoor advertising... It is used by merchants whose clients are concentrated in a relatively small space.

Advantages:

  • - very noticeable and due to its size has a strong impact on consumers;
  • - affects consumers constantly, 24 hours a day, for a long time;
  • - simply and very effectively conveys your information, gives an idea of ​​the position of the company.

Flaws:

  • - high price;
  • - the invested funds are returned no earlier than in a few months, or even years.
  • 8. Advertising on means of transport includes three types: internal advertising stickers, external posters on the sides of vehicles and billboards at stops and platforms.

Advantages:

  • - well visible;
  • - available for 16 or 18 hours a day;
  • - for different groups consumers.

Flaws:

  • - constantly moving; people have a few seconds to assimilate information;
  • - exposed to atmospheric factors.
  • 9. Other advertising media: computer and video advertising versions transmitted by modem, on disk or on CD (subscribers electronically sort information in search of the necessary information, ignoring unnecessary ones), electronic telephone directory, computer networks, advertisements on clothes, inserts in books, telephone advertisements, telefax, advertisements on video cassettes, on answering machines, holograms, via satellite communications.

Ballroom dancing as an art form

Types and techniques visual arts

One of the main tasks of our society facing the system modern education, is the formation of a culture of personality. The urgency of this task is associated with the revision of the system of life and artistic and aesthetic values ​​...

The value of the dance pattern in creating an artistic image in choreography

Illustrating a literary work

Exist definite connection drawing and composition with the embodiment of the idea in color. Color, light, shape and tone are interrelated components of the image ...

Study of the artistic and graphic features of sketches of theatrical costumes and the possibility of their use in the image of a modern costume

No. of the figure Name of the graphic solution Generalized schematic representation of the elements of the macrostructure of the elements of the middle structural level of the elements of the microstructure fig. 2 in ...

Complex expressive means, their organization when staging a theatrical performance

When starting to create a mass performance, the production director must find answers to three questions: 1. What will I stage? 2. How will I bet? 3 ...

Magic dance of I. Moiseev

Noting the fundamental difference that exists between figurativeness and expressiveness in the way of organizing and artistic reproduction of objective reality in an image, one must proceed from the fact ...

Development of culture as a set of "means of communication"

In each work of G. McLuhan, three main directions can be clearly traced. The first direction is devoted to art, which can be considered as a cognitive process related to symbolic means ...

Table 1 No. Cosmetic product name Trade mark Characteristics 1. Make-up remover Nivea Make-up remover, gently removes cosmetics from the skin of the face and eyes. 2 ...

Development and implementation of a make-up for an ethnic mask on the theme: "Cultural heritage of African peoples"

Table 3 № Name of the means of decorative cosmetics Trade mark Characteristics 1. Liquid face painting Mehron Face painting of brown color, dries quickly, saturated color. Used to cover large areas of skin. 2 ...

Development of services for the production of a musical pop group

Producer (from English producer - producer, commodity producer, manufacturer) is a specialist who is directly involved in the production of a project, regulates (or helps to regulate) financial, administrative ...

Creation of male and female images under the motto "Jasmine and Aladdin"

Tools: - straight scissors - for hair cutting; - serrated scissors - needed for thinning hair ...

Costumes, props, music, stage lighting are traditional means used in all types of performing arts. In addition, there is a specificity in the use of these funds in street theatrical performances ...

Holiday decoration

Mass Views and holidays, which have a multi-thousand-year history, are a powerful means of ideological and emotional impact on the widest audience. The evolution of the aesthetics of the modern multimedia show is taking place ...

Art styles in the interior

3.1. Empire style One of the later trends of classicism - Empire style (first quarter of the 19th century), which arose in Napoleonic France(French empire - empire) ...

1. Concept working capital and their features.

2. Composition and structure of working capital.

3. Placement of working capital.

4. Methods for determining the needs of the enterprise in working capital.

5. Sources of formation of working capital.

6. Indicators of the state of working capital.

7. Indicators of the efficiency of working capital.

8. Ways to improve the use of working capital.

Working capital represent monetary resources that are invested in circulating production assets and circulation fund, in order to ensure uninterrupted production and sale of manufactured products.

Working capital refers to the assets of the enterprise. The composition of working capital is shown in Figure 6.1.


Rice. 6.1. Composition of working capital

Working capital is classified in three categories:

1. depending on their participation in the circulation of funds;

2. from planning methods, principles of organization and regulation;

3. from sources of formation.

Depending on their participation in the circulation of funds,

- circulating assets advanced to circulating production assets;

- working capital advanced into circulation funds.

Depending on planning methods working capital is subdivided into:

- normalized;

- irregular.

To normalized include working capital in inventories, work in progress, deferred expenses, in the balances of finished products in the warehouse.

To non-standardized working capital includes finished goods in shipment and cash.

Depending on the sources of formation working capital is subdivided into:

- own and equated to own;

- borrowed;

- others.

Working capital organization system at enterprises is based on the following principles:

1. operational independence in the use of working capital;

2. determination of the planned needs and placement of working capital;

3. adjustment of standards taking into account the economic conditions, production volumes, prices, suppliers and consumers, payment forms;

4. rational system of financing of working capital;

5. control over the rational allocation and use of working capital.


Determination of the need for working capital is carried out through their regulation.

Working capital ratio represents the minimum planned stock of inventory items required for normal work enterprises. The following are subject to standardization:

but) productive reserves;

b) work in progress and semi-finished products own production;

c) prepaid expenses;

d) finished products in stock.

The aggregate standard of working capital is determined: Nose = Npz + Nnp + Nrbp + Ngp (6.1)

The methodology for determining the standard of working capital by elements is presented in Table 6.1.

Table 6.1.

Calculation of the standard of working capital

Type of working capital Data for calculating standards Formula for calculating standards
Relative indicator, according to which the standard is calculated Working capital ratio indicator
Production stocks (raw materials, basic and auxiliary materials, purchased semi-finished products and components, containers, fuel, spare parts for repairs, low-value and wearing items, special tools and equipment Daily consumption of inventories (Rsut.) Stock days (Dzap.) Production stock ratio (Np.z.): Np.z = Rday. + + Dzap
Work in progress and semi-finished products of our own production 1. Daily output of products according to production cost(Sday) 2. Coefficient of product availability (growth rate of costs) Kgot Duration production cycle(TC) Work in progress (WIP) standards: Nnp = Sday * * Tts * Kgot
Future spending 1. Funds invested in deferred expenses at the beginning of the year (RBPnach) 2. Expenses provided for in the planned year (RBPl) 3. Expenses included in the cost of production of the planned year (RBPseb) The rate of future expenses (Nrbp): Nrbp = RBPnach + + RBPpl-RBPseb
Finished products Working capital ratio for the enterprise as a whole Daily output of products at production cost (Sday) Inventory days (storage in the warehouse and preparation of shipping documentation (Dhr) Finished product standard (Ngp): Ngp = Sday * Dhr Nose = Npz + Nnp + + Nrbp + Ngp

When determining the daily requirement for production stocks, one proceeds from the annual (quarterly) needs of raw materials, materials, purchased semi-finished products and components, low-value and wearing items, spare parts for repairs, fuel, etc., to fulfill the production program.

Daily requirement(consumption) in certain types of production stocks is calculated:

Rsut = R / D;(6.2.)

where P is the consumption of the corresponding type of inventory (annual, quarterly) according to the estimated production costs;

D - the duration of the planning period in days (year - 360 days, quarter - 90 days).

Stock rate of production stocks in days it is determined:

Dzap = Dtek + Dstr + Dpodg + Dtr;(6.3.)

Where Dtek is the current stock, days.

Dstr - safety stock, days

Dpodg - preparatory stock, days

Dtr - transport stock, days

The current stock is assumed to be 50% of the duration of the interval between deliveries. The safety stock is determined in the amount of 30-50% of the current stock. The preparatory stock is determined by specific conditions. The transport stock is determined by the difference in days between the duration of the mileage and the document flow.

Determination of the need for working capital is determined by two methods:

1.direct calculation method;

2. economic method.

As a rule, the minimum need for working capital is covered by its own funds: statutory fund, fund special purpose, earmarked funding and earmarked contributions (from budgetary, sectoral, extrabudgetary funds), sustainable liabilities and other sources.

When determining the sources of financing of working capital, stable liabilities are calculated wages employees, deductions for social events, advance payments.

The minimum indebtedness of deductions for social events is determined as a percentage of the amount of stable liabilities for wages.

The minimum debt for the reserve of forthcoming payments, advance payments is established based on the analysis of reporting data.

Sequence of coverage of the increase in working capital:

Increase in stable liabilities;

Profit;

Other sources.

The state of circulating assets is characterized by the presence of its own circulating assets on a certain date.

Own working capital is determined by:

ObSob = I P + II P - IА,(6.4.)

where I P, II P - 1st and 2nd sections of the liability,

IA - the first section of the asset.

When comparing the actual availability of own working capital, there may be a surplus or deficiency. A surplus of own working capital may arise as a result of overfulfillment of the profit plan, incompletely contributed funds to the budget, free receipt of inventory, etc.

Lack of own circulating assets, when their actual availability is less than the standard.

For characteristics efficient use of working capital various indicators are used:

1. turnover time (turnover rate);

2. the ratio of the turnover of current assets;

3. coefficient of fixing current assets;

4. coefficient of efficiency of working capital

5. release of working capital.

The most important indicator of the efficiency of working capital is the turnover rate or turnover time.

Turnover time is determined by:

Oos = OS.n.av * D / RP (6.5.)

where, Оos - turnover time;

OS.n.sr. - average balances of normalized working capital;

D - period time;

RP is the volume of product sales.

or Oos = D / Cob (6.6.)

where, Cob is the turnover ratio.

Turnover ratio is determined by:

Cob = RP / OS.n.sr (6.7.)

Fastening ratio(loading) of working capital is determined by:

Kzak = OS.n.sr / RP (6.8.)

Kzak = 1 / Kob (6.9.)

Efficiency ratio working capital is determined:

Kef = Pr.real / OS.n.sr (6.10.)

where, pr. real. - profit from product sales.

As a result of the acceleration of the turnover of circulating assets, their release occurs, which can be both absolute and relative.

Absolute release is defined as the difference between the planned average balances of working capital and actual balances for a given period:

DOsabs = Expl. Av. - Osf.(6.11.)

or DOsabs = RPsut (Wob.pl. - Wob-f),(6.12)

where RPsut is the daily volume of sales.

The relative release of working capital is determined taking into account the fulfillment of the assignment for the sale of products:

DOsotn = Ospl * RPf - OSf(6.13.)

where, RPpl, RPf - planned and actual sales volumes.

In practice, used performance indicators use of material resources:

- material consumption:

- material efficiency;

The functioning of working capital at the enterprise begins from the moment of their formation and use.

Depending on the location, conditions for organizing production and sales of products, working capital has a different level of liquidity and risks of use.

Liquidity level assessed by the following main indicators:

- working capital security ratio own funds;

- coverage ratio;

- absolute liquidity ratio.

Own working capital determined:

Ossob = I P - IA, or(6.14)

Ossob = I P + II P - IА.(6.15.)

Where I P - the first section of the balance sheet liability “own and equivalent funds;

IA - the first section of the balance sheet asset "fixed assets and fixed assets"

II P - long-term liabilities;

Coverage ratio balance is determined

Kpokr = OS / Ok.with. (6.16.)

Where OS is the amount of working capital (current assets of the enterprise)

Ok.with. - the sum of the company's liabilities, short-term

Short-term liabilities include: loans, short-term loans, accounts payable, overdue debts.

Absolute liquidity ratio is determined by:

Kl.abs. = (DS + Vl.s.s.) / Ok.s. (6.17)

Where DS - cash;

Vl.s.s. - short-term investments.

Questions for control.

1. What are the elements of the company's working capital?

2. What are the distinctive features of working capital from fixed assets?

3. What funds are included in the working capital?

4. What is the rationing of current assets carried out for?

5. What is the standard of working capital?

6. What is the difference between the standard and the rate of expenditure of working capital?

7. What elements of working capital are subject to regulation?

8. What is meant by the structure of working capital?

9. How is the standard of working capital in production inventories established?

10. How is the standard of working capital determined in finished products in stock?

11. How is the standard of working capital calculated for work in progress?

12. What indicators assess the state of working capital at the enterprise?

13. What indicators assess the efficiency of the use of working capital?

14. How does the placement of working capital at an enterprise affect its financial condition?

Antihistamines Is a group of drugs that block sensitive endings of cells to a compound called histamine, thereby preventing and eliminating its negative effects on the body. By turning off certain receptors from the work, drugs eliminate allergies, inhibit the secretion of hydrochloric acid in the stomach, and have a calming effect.

H1 blockers

Drugs of this type act primarily on the H1 receptors. In medicine, they are used to eliminate allergic reactions: inflammation, swelling, redness, rashes, and more.

Subdivided into 3 generations:

  1. First generation. This generation is notable for its low selectivity of action. This means that the funds affect not only the desired cells, but also others, thereby causing many undesirable reactions. Require multiple doses per day. And the higher the dosage, the less the expected effect and the more side effects. Almost all drugs cause drowsiness.
  2. Second generation. They have a longer action, while the application can be only 1 time per day. They cause fewer side effects, including drowsiness.
  3. Third generation. They are active metabolites of the previous generation. This means that the substances of these drugs begin to act immediately, they do not undergo splitting first, like the others. Hence follows a high rate of onset of the effect and a decrease in the negative effect on the liver.

All generations apply under the following conditions:

H2 blockers

The drugs of this group act mainly on the second type of receptors. They are responsible for regulating the production of hydrochloric acid in the stomach and an enzyme called pepsin, which is responsible for the breakdown of proteins.

Feature: in addition to the effect on the digestive system, they have a weak effect on the immune processes of the body and, to a lesser extent than H1 blockers, relieve inflammation.

They are divided into several generations, where each previous one is more perfect, is devoid of some side effects and the speed of the onset of the therapeutic effect is increased. 4th and 5th generations have not yet been registered in Russia. First generation discontinued due to severe adverse events.

The funds have found their application in the treatment of:


H3 blockers

Receptors of the third type are mainly found in the brain. Unlike other drugs, this group of substances has a stimulating effect and can even improve memory, attention, and increase mental performance.

So far, there are few drugs that block only these sensitive cell endings. Basically, those drugs are used that do not have selective activity in relation to the third type, but act on all types of histamine.

Application:

  • noise in ears;
  • hearing loss;
  • dizziness accompanied by nausea and vomiting.

List of drugs

Features of the use of antihistamines in different groups of people

Each age and for certain diseases have their own medicines, which in each case will give the proper effect from their use.

For children

This is a special group for which only a doctor should prescribe drugs, seeing the whole situation as a whole.

Up to a year

Drugs that block type 1 receptors are prescribed when allergic reactions occur: itching, rash, transparent snot, edema, inflammation. They are prescribed in the form of drops or syrups.

At this age, the following are allowed:

  • Fenistil (from 3 months).
  • Zodak.
  • Erius.

Means that suspend the activity of type 2 receptors, in extremely rare cases, are prescribed to children of the first year of life, since their digestive system is not yet perfect, and they are prescribed for increased acidity of the stomach.

From one to 5 years

H1-blockers are used to eliminate urticaria, with allergic conjunctivitis, during seasonal allergies.

  • Zyrtec drops.
  • I gave the solution.
  • Lordestine syrup.

H2 blockers continue to be used with caution in childhood.

From 5 years

During this period, with allergic conditions, all the same drops and solutions are taken, but tablets can also be connected.

In addition to the above drugs, they also take:

  • Diazolin.
  • Fenkarol.
  • Suprastinex drops.

For pregnant and lactating mothers

All antihistamines are prohibited for this category of women for self-administration. Only a doctor has the right to prescribe them, and even then after the other means have not given positive results. No histamine receptor blocker has been properly tested in pregnant women to prove its safety.

For adults

H1-histamine receptor blockers are used for any allergic manifestations. Also, some doctors advise them for colds in order to relieve swelling and facilitate nasal breathing, besides, they relieve tearing well.

Pills are popular among the adult population:

For problems with increased acidity of the stomach, ulcers and problems with the esophagus, H2-histamine receptor blockers are prescribed. Although now the drugs in this group are a little outdated, they are being replaced.

For the elderly

Older people prefer the products that have been proven over the years:

  • Famotidine.

Elderly patients with impaired brain function, dizziness and tinnitus, experts recommend blockers of H3-histamine receptors.

On the pharmaceutical market, there are no freely available drugs that affect only type 3 receptors. Instead, drugs are prescribed that act on all 3 types, for example, Betahistine.

Contraindications

Side effects

H1 histamine receptor blockers

The most common undesirable effect, especially in the 1st generation, is drowsiness.

Other phenomena:

  • dizziness, headache;
  • dry mucous membranes;
  • stool disorders;
  • decrease in pressure;
  • heart palpitations.

H2 blockers of histamine receptors

The drugs that had very strong undesirable effects were not re-registered in Russia. These include cimetidine. There was information that he had a bad effect on male potency and the cardiovascular system.

Frequent side effects of other drugs:

  • nausea, vomiting;
  • drowsiness;
  • slow heart rate;
  • dry mouth;
  • loss of clarity of vision.

H3 blockers of histamine receptors

Only the side effects of those drugs that affect all 3 types of sensitive cell endings will be given.

  • insomnia;
  • allergic reactions;
  • weakness;
  • headache.

Natural antihistamines

Some herbs can be brewed / infused and drunk instead of medicines, if for some reason it is not possible to take them. If the plants themselves do not cause allergies, they are saved in simple situations. Suitable for use:

According to the legislation of the EAEU, encryption (cryptographic) means(Further - ShKS) - This " hardware, software and hardware-software tools, systems and complexes that implement algorithms for cryptographic transformation of information and are designed to protect information from unauthorized access during its transmission through communication channels and (or) during its processing and storage” .

This definition very abstract, in connection with which the assignment or non-assignment of a particular product to the QMS may cause significant difficulties.

List of goods related to ShKS

In the Regulation on the import (export) of the ShKS, there is a list of functions (components) that the goods must contain in order for it to be considered ShKS:

  • means of imitation protection
  • means of electronic digital signature
  • coding tools
  • cryptographic key making facilities
  • the cryptographic keys themselves
  • systems, equipment and components designed or modified to perform crypto-analytical functions
  • systems, equipment and components designed or modified to apply cryptographic techniques for generating spreading code for spreading spectrum systems, including code hopping for frequency hopping systems
  • systems, equipment and components designed or modified to apply cryptographic channelization techniques or secret codes for time-modulated ultra-wideband systems.

However, in practice, a situation often arises that Customs, guided by the list from section 2.19 (and even only by the TN VED code from the list), they may decide that the imported product is an encryption tool (and it does not matter if there is actually encryption there or not). In this case, the importer will have to receive permits or prove to customs that there is no encryption in the product.

The procedure for the import (export) of ShKS

Depending on the customs procedure for the import (export) of the ShKS, it is necessary to issue different kinds documents:

12 categories of BCS

In practice, the vast majority of encrypted goods are imported on the basis of a notification.

Notification can be registered only for goods belonging to one or more of the 12 categories of encryption tools, the technical and cryptographic characteristics of which are subject to notification. This list is given in the Regulation on notification.

Category no. 1

1. Goods containing encryption (cryptographic) means, having any of the following components: 1) a symmetric cryptographic algorithm using a cryptographic key with a length not exceeding 56 bits; 2) an asymmetric cryptographic algorithm based on any of the following methods: factorization of integers, the size of which does not exceed 512 bits; calculation of discrete logarithms in the multiplicative group of a finite field, the size of which does not exceed 512 bits; discrete logarithm in the group of a finite field other than the field specified in the third paragraph of this subclause, the size of which does not exceed 112 bits.

ShKS of this category perform various cryptographic functions, but the determining factor for assignment to this category is the length of the cryptographic key. The specified key lengths are significantly less than the recommended ones minimum values for the corresponding groups of algorithms. The use of such short cryptographic keys makes it possible to modern equipment brute-force opening of encrypted messages.

Symmetric encryption is mainly used to ensure the confidentiality of data, and is based on the fact that the sender and recipient of information use the same key both to encrypt messages and to decrypt them. This key must be kept secret and transmitted in a way that excludes its interception. Examples of symmetric encryption algorithms: RC4, DES, AES.

Of the algorithms listed, only DES (considered obsolete) certainly falls into category 1; also the RC4 algorithm can sometimes be used with short keys (for example, in the WEP technology Wi-Fi connection: key length 40 or 128 bits).

IN asymmetric encryption algorithms(or public-key cryptography) one key (public) is used to encrypt information, and another (secret) is used to decrypt information. These algorithms are widely used to establish secure connections over open communication channels for the purpose of digital signature. Examples of algorithms: RSA, DSA, Diffie - Hellman Protocol, GOST R 34.10-2012.

These methods refer to the mathematical basis for the functioning of asymmetric algorithms:

  • integer factorization - RSA algorithm
  • computation of discrete logarithms in the multiplicative group of a finite field - DSA, Diffie-Hellman, El-Gamal algorithms
  • discrete logarithm in the group of a finite field other than the field specified in paragraph three of this subclause - algorithms on elliptic curves: ECDSA, ECDH, GOST R 34.10-2012.

Examples of notified SHKS: theoretically, any product can use outdated algorithms, or short keys in modern algorithms. In practice, however, this makes little sense, since does not provide an adequate level of protection. One real example would be Wi-Fi in WEP mode with a 40-bit key.

Category no. 2

2. Goods containing encryption (cryptographic) means with the following limited functions: 1) authentication, which includes all aspects of access control, where there is no encryption of files or texts, with the exception of encryption, which is directly related to the protection of passwords, personal identification numbers or similar data to protect against unauthorized access;

User authentication within this category involves comparing the password entered by him or other similar identifying data with information stored in the database of authorized users, and the encryption process itself consists in protecting the user's confidential data from copying and illegal use when they are transferred from the authentication object (user) to the controlling device.

Examples of notified SHKS: devices for access control and management systems - password readers, devices for storing and forming databases of authorized users, network authentication devices - gateways, routers, routers, etc., devices with protection of information stored on them - hard drives with a password restriction function access.

2) electronic digital signature(electronic signature).

The signature process is implemented by cryptographic transformation of information using the signature private key and allows you to check the absence of distortion of information in the electronic document from the moment the signature was formed (integrity), the signature belonging to the owner of the signature key certificate (authorship), and in case of successful verification, confirm the fact of signing the electronic document (non-repudiation).

Examples of notified SHKS: EDS generators, software to support and implement the mechanism EDS application, storage devices for key information EDS.

Category no. 3

3. Encryption (cryptographic) means, which are components of software operating systems, the cryptographic capabilities of which cannot be changed by users, which are developed for installation by the user independently without further substantial support from the supplier and technical documentation(description of algorithms for cryptographic transformations, interaction protocols, description of interfaces, etc.) for which it is available to the user.

Operating system it is a complex of interconnected programs designed to manage computer resources and organize interaction with the user.

Examples of notified SHKS: operating systems and software packages based on them.

Category no. 4

4. Personal smart cards (smart cards): 1) whose cryptographic capabilities are limited by their use in the categories of goods (products) specified in clauses 5 - 8 of this list; 2) for widespread public use, the cryptographic capabilities of which are not available to the user and which, as a result of special development, have limited protection capabilities stored on them personal information.

Smart cards these are plastic cards with a built-in microcircuit. In most cases, smart cards contain a microprocessor and an operating system, control device and controlling access to objects in its memory.

Examples of notified SHKS: SIM cards for access to services of mobile operators, bank cards equipped with a microprocessor chip, intelligent identification cards of its owner.

Category 5

5. Receiving equipment for broadcasting, commercial television or similar commercial equipment for broadcasting to a limited audience without encryption of the digital signal, except when encryption is used solely for managing video or audio channels, sending bills or returning program related information to broadcasting providers.

This category refers to goods designed to provide the user with access to paid encrypted digital satellite, terrestrial and cable TV channels and radio stations (radio channels) (examples of standards: DVB-CPCM, DVB-CSA).

Examples of notified SHKS: TV tuners, TV signal receivers, satellite TV receivers.

Category no. 6

6. Equipment, the cryptographic capabilities of which are not available to the user, specially designed and limited for use in any of the following ways: 1) the software is executed in a copy-protected form; 2) access to any of the following: copy-protected content stored only on a read-only electronic storage medium; information stored in encrypted form on electronic storage media, which are offered for sale to the public in identical sets; 3) control of copying audio and video information protected by copyright.

Examples of notified SHKS: Game consoles, games, software, etc.

Category no. 7

7. Encryption (cryptographic) equipment specially designed and limited for banking or financial transactions.

Products in this category must be a hardware device, i.e. to have a finished form of banking equipment, the use of which does not imply additional assembly or revision, except for the purposes of modernization.

Examples of notified SHKS: ATMs, payment terminals, pin-pads (bank cards are classified as category No. 4).

Category no. 8

8. Portable or mobile radio electronic means of civil use (for example, for use in commercial civilian cellular radio communication systems) that are not capable of end-to-end encryption (from subscriber to subscriber).

This category includes all mobile cellular devices operating in the GSM, GPRS, EDGE, UMTS, LTE standards, as well as some radio stations. The main requirement for products of this category in the area of ​​functionality performed is the lack of ability to end-to-end encryption, i.e. communication between subscribers must be carried out through a relay device.

Examples of notified SHKS: Mobile communication devices and devices incorporating cellular communication modules of the above standards, radio stations.

Category No. 9

9. Wireless radio electronic equipment that encrypts information only in a radio channel with a maximum wireless range without amplification and retransmission of less than 400 m in accordance with technical conditions manufacturer.

This includes most devices that can otherwise be referred to as "Short-range radio electronic means"... Encryption occurs when transmitting / receiving information over a wireless radio channel in order to protect it from interception, penetration of unauthorized users into the communication network. As you know, most wireless data transmission standards support such protection: Wi-Fi, Bluetooth, NFC, sometimes RFID.

Examples of notified SHKS: routers, access points, modems, devices containing short-range wireless radio communication modules, contactless access / payment / identification cards.

Category no.10

10. Encryption (cryptographic) means used to protect technological channels of information and telecommunication systems and communication networks.

This category describes products that are network devices that perform commutation and service functions. As a rule, most of these devices support simple network management protocols that allow you to monitor the status of the network, its performance, as well as send commands of the network administrator to its various nodes.

Examples of notified SHKS: Servers, switches, network platforms, gateways.

Category no.11

11. Goods, the cryptographic function of which is blocked by the manufacturer.

This category can be represented absolutely different types devices for different purposes and applications. The decisive factor in the classification of such goods into category No. 11 is the presence of a pre-installed software or hardware that produces targeted blocking cryptographic functions performed by the product.

Category No. 12

12. Other goods that contain encryption (cryptographic) means other than those specified in clauses 1-11 of this list, and meet the following criteria: 1) are generally available for sale to the population in accordance with the legislation of a member state of the Eurasian Economic Union without restrictions from those available in availability of assortment in places retail through any of the following: cash sales; sales by ordering goods by mail; electronic transactions; sales by phone orders; 2) encryption (cryptographic) functionality of which cannot be changed by the user in a simple way; 3) designed for installation by the user without further substantial support from the supplier; 4) technical documentation confirming that the goods comply with the requirements of subparagraphs 1 - 3 of this paragraph, is posted by the manufacturer in the public domain and, if necessary, is submitted by the manufacturer (a person authorized by him) to the coordinating body at his request.

It is worth noting that in practice, the CLSP of the FSB of Russia imposes increased requirements for the submission of materials for the registration of notifications for goods of this category. So, all the listed criteria must be confirmed (by links to the manufacturer's website with information in Russian or documented).

The most common categories of BCS

For each notification, the Unified Register contains a list of categories to which the product belongs. This information encoded in the field "Identifier": the field is a 12-digit code, while if the product belongs to the category with number N from the list above, then position N in the code will contain the number 1, otherwise - 0.

For example the code 110000000110 indicates that the product has been notified for categories 1, 2, 10 and 11.

It is interesting to look at the statistics of the use of various categories.

As can be seen from the diagram, the most widespread and frequently encountered cryptographic functions in the SCS are data encryption in a short-range wireless radio channel (Wi-Fi, Bluetooth) - 27% of the total number of registered SCS, which is logical, given the volume of produced mobile communication devices, personal computers and other technical devices equipped with modules that support these communication technologies.

The second place is taken by SCS, which support the functions of authentication and control of access to protected information - 19,5% ... This trend is also easily explained by increased standards and consumer demands for the protection of personal information both on physical media (hard drives, USB flash drives, servers, etc.) and on network ( cloud storage, network data banks, etc.). Additionally, it should be noted that the overwhelming majority of SCS used in access control and management systems (better known as ACS) also perform cryptographic functionality that belongs to category No. 2.

Since networking is an integral part of the functioning of any information system, then aspects of administration of this communication network are implemented in network control devices. The security of the control interface organized by these devices is implemented through the use of encryption mechanisms for technological communication channels, which is the basis for categorizing this kind of CCS according to category No. 10, which is the third most common - 16% .

It is also important to note that the least common SCS features are categorized №5 (0,28% ), №12 (0,29% ) and №7 (0,62% ). Products that implement these cryptographic functions are rare and when registering with the CLSP, their documentation is subjected to a more detailed analysis, since "Not put on stream" and sets of used cryptographic protocols and algorithms can be unique in each case. That is why products of these categories must be given maximum attention when compiling required documents, because otherwise the risk of refusal to register the notification is extremely high.

Notes (edit)

Links

  • Electronic signature (EDS), - Single portal Electronic signature, - http://www.techportal.ru/glossary/identifikatsiya.html
  • Cryptographic methods of protecting information, - Collection of lectures on the basics local area networks National Open University, - http://www.intuit.ru/studies/courses/16655/1300/lecture/25505?page=2
  • The concept of an operating system, - Materials of the portal about operating systems, - http://osys.ru/os/1/ponyatie_operatsionnoy_sistemy.shtml
  • Introduction to SNMP, - Materials on network security, - http://network.xsp.ru/6_1.php