Overview of information security

 Introduction:-

         Security is the prevention of certain types of intentional actions from occurring in a system.

– These potential actions are threats.

– Threats that are carried out are attacks.

– Intentional attacks are carried out by an attacker.

 – Objects of attacks are assets.

What is Security? 

           “The quality or state of being secure-to be free from danger.”

Goals of Security

1. Prevention – Prevent attackers from violating security policy

2. Detection – Detect attackers’ violation of security policy

3. Recovery – Stop attack, assess and repair damage

4. Survivability – Continue to function correctly even if attack succeeds

What is Information Security? 

          Information Security is the practice of defending information from

– Unauthorized access,

– Unauthorized use,

 – Disclosure,

– Disruption,

– Modification,

– Perusal,

– Inspection,

 – Recording

– Destruction.

• It is a general term that can be used regardless of the form the data may take.

                    • The Committee on National Security Systems (CNSS) defines information security as the protection of information and its critical elements, including the systems and hardware that use, store, and transmit that information.

How to Achieve Security?

 A successful organization should have multiple layers of security in place:

  • Physical security, to protect physical items, objects, or areas from unauthorized access and misuse.
  • Personnel security, to protect the individual or group of individuals who are authorized to access the organization and its operations – Human Beings.
  • Operations security, to protect the details of a particular operation or series of Activities. – Communications security, to protect communications media, technology, and content.
  • Network security, to protect networking components, connections, and contents.
  • Information security, to protect the confidentiality, integrity and availability of information assets, whether in storage, processing, or transmission. It is achieved via the application of policy, education, training and awareness, and technology.

Post a Comment

0 Comments