Introduction:-
Security is
the prevention of certain types of intentional actions from occurring in a
system.
– These potential actions are threats.
– Threats that are carried out are attacks.
– Intentional attacks are carried out by an attacker.
– Objects of attacks
are assets.
What is Security?
“The quality or state of being secure-to be free from danger.”
Goals of Security
1. Prevention – Prevent attackers from violating security
policy
2. Detection – Detect attackers’ violation of security
policy
3. Recovery – Stop attack, assess and repair damage
4. Survivability – Continue to function correctly even if
attack succeeds
What is Information Security?
Information
Security is the practice of defending information from
– Unauthorized access,
– Unauthorized use,
– Disclosure,
– Disruption,
– Modification,
– Perusal,
– Inspection,
– Recording
– Destruction.
• It is a general term that can be used regardless of the
form the data may take.
•
The Committee on National Security Systems (CNSS) defines information security
as the protection of information and its critical elements, including the
systems and hardware that use, store, and transmit that information.
How to Achieve Security?
A successful
organization should have multiple layers of security in place:
- Physical security, to protect physical items, objects, or areas from unauthorized access and misuse.
- Personnel security, to protect the individual or group of individuals who are authorized to access the organization and its operations – Human Beings.
- Operations security, to protect the details of a particular operation or series of Activities. – Communications security, to protect communications media, technology, and content.
- Network security, to protect networking components, connections, and contents.
- Information security, to protect the confidentiality, integrity and availability of information assets, whether in storage, processing, or transmission. It is achieved via the application of policy, education, training and awareness, and technology.
0 Comments