INFORMATION SECURITY CONCERNS

In today’s, networked society where computer outsells radio and TV, Online shopping is becoming more popular daybyday. The need for providing secure network environments is on top priority for all organizations. Weakness in such a system may lead to all kind of attacks, threat and loss of essential information. Information security deals with how you can secure your personal and confidential information from the rest of the world. We will discuss the basic need of information security in an organization. Why do we need to secure our information from the rest of world. Because no one should access it, without your permission or without authentication. We will also discuss about the threats or attacks in breaching of the information security and how easily can a person or software penetrates into your system and accesses your information. After accessing your information, an intruder can manipulate, destroy or misuse your information or data. Here we will also focus on the different types of threat subjected into the information security systems. We are also going to introduce information regarding identification and resolving different kinds of attacks. Finally we have some basic kind of guidelines or policies for the users who want to keep their information secure.

It is becoming increasingly essential for all organisations to ensure data security. Ensuring data security on PCs and LANs is a major problem as, inherently, very few mechanisms are provided to guard against data loss, corruption, misuse or eavesdropping. Unless the organisation creates security awareness in its work force, any measures for data security are not likely to prove successful.

The organisation must decide on the IT and security policy at the highest level and ensure its strict implementation for a reasonably successful outcome. There are a number of measures available to the organisation, specially on larger system, to ensure data security. Equal attention, however, needs to be paid to PC security as there is an increasing use of PCs as terminals.

Here we discussed about the term Information security and its need. As you know the term Information the security of, it deals with secure your personal and confidential information from the rest of the world. We also defined the main aim behind to secure your data. The terms are availability, integrity and confidentiality. In these terms we secure our data. We also discuss about the threats or attacks in breaching of the information security. How easily can a person or software penetrate into your system and access your information. After accessing your information, it can manipulate, destroyed or misused it. In this unit we discuss about the different types of threat subjected into the information security systems. We also introduce information as to how to identify and sort out these types of attacks. Finally we have some kind of guidelines or policies for the users who want to keep their information secure.

Comments

Popular posts from this blog

COMPUTER VISION

FUNDAMENTALS OF EMBEDDED SYSTEMS

ADVANCED METHODS OF COMMUNICATION WITH A COMPUTER