Sunday, May 12, 2019
AN INTRODUCTION TO INFORMATION AND CYBER SECURITY Thesis - 1
AN INTRODUCTION TO INFORMATION AND CYBER SECURITY - Thesis deterrent examplePrimarily, earnest is protection from danger. There are various types of credentials e.g., operation, communication and network security system. While selective selective information system is made up of hardware, software, data, people, procedures and networks. According to the committee on National Security System, Information security is defined as the protection of information and its critical elements, including the system and hardware that use, store, and transit that information. It includes the broad areas of information security management, computer, data, and network security (Whitman & Mattord, 2012). There are three characteristics of information that gives it value to organization availability, integrity and confidentiality. Therefore, these three elements have to be secured since they are vital to an organization. However the threats to the characteristics of information have evolved into a huge collection of events including accidental, intentional damage, theft, and unauthorized modification. Hence there is development of a more robust stumper of information security that addresses this threats ,the model consist of critical characteristics of information availability,accuracy,authenticity , possession, integrity ,utility and confidentiality.Therefore,upper management drives a top-down and the traditional system development life cycle approach in order to implement security in organizations. Finally information security mickle also be described as both(prenominal) an art and science as it also comprises aspects of social science (Shimeall & Spring, 2014).Global perspective in security entails the dynamic security environment and its intrinsic challenges. It includes all the current issues in information security and how they can be managed.Idealy, there are six major(ip) aims of security and they are divided into six major categories. Table 1.11There are variou s types of attacks that information security can come across. One of them is protocol stack, i.e fig 1.12
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment