Sunday, 4 October 2020

Information system security

 






Information system security, security is the quality or condition of being safe to become free from danger, in other words, it is protection against opponents who want to inflict harm with intent or intent or not, and the goal is national security. A successful organization must have several layers of security to protect its business, and they are as follows:

 

Physical Security: To protect physical objects or objects, or places, from unauthorized access and misuse.

 

Personal security: to protect an individual or group of individuals who are authorized to access the organization and its business

 

Process security: to protect details from a specific process or series of activities.

 

Communication security: to protect the medium of communication, technology, and content.

 

Network security: to protect network components, communications, and content.

 

Information security: to protect information assets. Information security is defined as protecting information. Critical elements include systems and hardware that use, store, and transmit information.

 

Information Critical Characteristics:

Availability: enables authorized users or computer systems to access information without errors or hindrances and receives it as required.

Validity: information is correct or accurate when it is free of errors and has a value that the user expects.

Reliability: It is the quality or the true state instead of fabrication, and the information is reliable when it is in the same state in which it was created, placed, stored, or transmitted.

Confidentiality: When the information is disclosed to unauthorized individuals or systems denied access to it here, the confidentiality has been disclosed, so confidentiality is to make sure that these persons or systems that have the rights and privileges to access the information.

 

Information system components:

Information system security, the information system is more than the computer components, it is a complete set of software, hardware, people, data, procedures, and networks we need in order to use information as a source in the organization, these six critical components enable information to be input, processing, output, and storage, Each of these components has its own strengths and weaknesses, and each component of the information system has its own protection requirements:

 

Software:

The software consists of applications, operating systems, and various tasks. The software may be the most difficult component in terms of security. Exploiting errors in programming software accounts opens the door for a large part of information attacks. The news is full of reports warning of gaps, errors, and weaknesses or Other problems with the software, software programming is similar to a container that carries the lifeline of information across an organization.

 

Hardware:

It is a tangible physical technology that implements the software, stores and uploads data, and provides ports or interfaces for information entry and exit from the system. Physical security policies deal with hardware as a physical property and protect physical property from damage or theft. Common tools of physical security such as Locks, keys, and restriction of access to and interaction with the hardware components of the information system, and securing the physical location of computers is very important because of the failure of physical security results in the loss of information.

 

data :

Data is stored, processed, and transmitted via a computer system and must be protected or secured. Data is often a valuable asset that the organization possesses and this is the main goal of deliberate attacks.

No comments:

Post a comment








Contact Us

Name

Email *

Message *