Information security: Difference between revisions

From WikiMD's Wellness Encyclopedia

Replaced content with "= Information Security = Information security refers to the practices and operations involved in protecting and defending information and IT systems against unauthori..."
Tag: Replaced
 
CSV import
 
Line 38: Line 38:
[[Category:Cryptography]]
[[Category:Cryptography]]
[[Category:Information governance]]
[[Category:Information governance]]
== Information_security ==
<gallery>
File:Posters_for_information_security_for_the_Ministry_of_Defense_of_the_Russian_Federation.jpg|Posters for information security for the Ministry of Defense of the Russian Federation
File:Defense_In_Depth_-_Onion_Model.svg|Defense In Depth - Onion Model
File:Privacy_International_2007_privacy_ranking_map.png|Privacy International 2007 privacy ranking map
File:CIAJMK1209-en.svg|CIA Triad
</gallery>

Latest revision as of 05:05, 18 February 2025

Information Security[edit]

Information security refers to the practices and operations involved in protecting and defending information and IT systems against unauthorized access, use, disclosure, disruption, modification, or destruction. The core objectives of information security are to ensure the availability, integrity, authentication, confidentiality, and non-repudiation of data and systems. This encompasses a wide range of measures, including the development of policies, the use of technology, and the training of personnel to guard against risks and to enable the safe, uninterrupted use of information technology resources.

Objectives[edit]

  • Availability: Ensuring timely and reliable access to and use of information and IT resources.
  • Integrity: Safeguarding the accuracy and completeness of information and processing methods.
  • Authentication: The process of verifying the identity of a user or IT resource.
  • Confidentiality: Preserving authorized restrictions on information access and disclosure.
  • Non-repudiation: Guaranteeing that a sender cannot deny the authenticity of their sent message and that the recipient cannot deny receipt.

Key Practices[edit]

  • Risk Management: Identifying, assessing, and taking steps to minimize risks to information security.
  • Cryptography: Using encryption to protect information stored on IT systems or transmitted through networks.
  • Access Control: Implementing policies and technologies to restrict access to information and IT resources.
  • Incident Response: Preparing for and managing breaches or attacks to minimize damage and recover from incidents.
  • Business Continuity Planning: Ensuring the continued operation of IT systems in the face of disruptions.

Challenges[edit]

Information security faces challenges from a variety of threats, including malware, phishing, ransomware, and insider threats. Emerging technologies such as cloud computing and the Internet of Things (IoT) also introduce new vulnerabilities.

Glossary of Information Security Terms[edit]

  • Access Control - A security technique that regulates who or what can view or use resources in a computing environment.
  • Cryptography - The practice and study of techniques for secure communication in the presence of adversaries.
  • Firewall - A network security device that monitors and filters incoming and outgoing network traffic based on an organization’s previously established security policies.
  • Intrusion Detection System (IDS) - A device or software application that monitors a network or systems for malicious activity or policy violations.
  • Malware - Software designed to disrupt, damage, or gain unauthorized access to a computer system.
  • Phishing - The fraudulent attempt to obtain sensitive information such as usernames, passwords, and credit card details by disguising as a trustworthy entity in an electronic communication.
  • Ransomware - A type of malicious software designed to block access to a computer system until a sum of money is paid.
  • Risk Management - The process of identifying, assessing, and controlling threats to an organization's capital and earnings.
  • VPN (Virtual Private Network) - A service that allows you to connect to the Internet via a server run by a VPN provider, creating a secure connection to protect your privacy and ensure secure and anonymous browsing.

Information_security[edit]