Information Security
Information Security

Information Security

Information security is the application of security controls to protect information and information systems from unauthorized access.

The Information Security Triangle

Information security?seeks guarantee the security triangle. The triangle is made up of three principles, confidentiality, availability, and integrity of information. This means protecting applications from treats, in order to guarantee the success and continuity of the business.

Confidentiality?attempts to ensure that only authorized users can access information.?Integrity?seeks to guarantee that the information is not lost or damaged. Finally,?availability?tries to guarantee that the information can be accessed by authorized users when and where they want.

These three concepts are important to protect a business from?threats?caused by vulnerabilities.?Attacks?by hackers generally exploit?vulnerabilities. Although sometimes?hackers?are able to use social engineering to gain access to confidential information.

Read full post on my blog...

Read the full post on my blog. Click here!

Vocabulary

Information Security

Information security is the application of security controls to protect information and information systems from unauthorized access.

Confidentiality

Confidentiality is the concept of assuring that private information is not disclosed to unauthorized individuals. Only those who are authorized to view the information are allowed access to it.

Availability

Availability is the concept of ensuring information is not denied to authorized users, and that the requirements to access it are not too difficult.

Integrity

Integrity is the assurance that information is changed only in a specified and authorized manner. This means that some policies should be in place to allow users to know how to utilize their system properly.

Threat

A threat is an action that can harm information and information systems by exploiting a vulnerability. Security threats include computer viruses like ransomware or unauthorized access through an unpatched hole.

Hacker

A hacker is the common term for anyone that gains unauthorized access to a system by using a vulnerability or by obtaining access to an authorized account.

Vulnerability

A vulnerability is a weakness in the information system that can be exploited by a cyber attack. Examples of vulnerabilities are: a weakness in a firewall that lets hackers get into a computer network, weak passwords, software infected with virus and missing data encryption.

Attack

An attack is an unauthorized action against an organization to damage or cause harm to information systems. Cybercriminals employ many types of attacks to break into computer networks and steal intellectual property, customer information, and financial information.

Read more about Information Technology, Data Science, and Project Management on my blog.

Read more about Technology on my blog. Click here!
Read more about Data Science on my blog. Click here!
Read more about Project Management on my blog. Click here!

要查看或添加评论,请登录

Héctor Chocobar Torrejón的更多文章

  • Advanced Android

    Advanced Android

    Below you can read a couple of paragraphs and technical vocabulary about advanced Android development. Android Manifest…

  • Python

    Python

    Python is a popular programming language. It is used for: web development (server-side), software development…

  • IT Service Management

    IT Service Management

    IT service management are the activities that are performed by an organization to design, build, deliver, operate and…

  • The Internet

    The Internet

    The internet is a collection of networks around the world that share resources. The Bones of the Internet The TCP/IP…

  • The Computer

    The Computer

    A computer is a digital electronic machine that can be programmed to carry out sequences of arithmetic or logical…

  • Introduction to iOS programming

    Introduction to iOS programming

    This post is an introduction to iOS development and will focus on the technologies provided and supported by Apple. The…

  • JavaScript

    JavaScript

    JavaScript is a lightweight, interpreted, multi-paradigm programming language with object-oriented capabilities…

  • Bluetooth

    Bluetooth

    Bluetooth is a standard technology which provides wireless communication, using radio frequencies, between computer…

  • Virtualization

    Virtualization

    Virtualization technologies was developed in the 1960s. It wasn’t widely adopted until the early 2000s.

  • IT Project Management

    IT Project Management

    IT project management is the application of knowledge, skills, tools, and techniques to complete a information…

社区洞察

其他会员也浏览了