1.0 INTRODUCTION AND 1.1 OBJECTIVES
1.0 INTRODUCTION
In today’s, networked society where computer outsells radio and TV, Online shopping is becoming more popular daybyday. The need for providing secure network environments is on top priority for all organizations. Weakness in such a system may lead to all kind of attacks, threat and loss of essential information. Information security deals with how you can secure your personal and confidential information from the rest of the world. In this unit, we will discuss the basic need of information security in an organization. Why do we need to secure our information from the rest of world. Because no one should access it, without your permission or without authentication. We will also discuss about the threats or attacks in breaching of the information security and how easily can a person or software penetrates into your system and accesses your information. After accessing your information, an intruder can manipulate, destroy or misuse your information or data. In this unit, we will also focus on the different types of threat subjected into the information security systems. We are also going to introduce information regarding identification and resolving different kinds of attacks. Finally we have some basic kind of guidelines or policies for the users who want to keep their information secure.
1.1 OBJECTIVES
After studying this unit, you should be able to;
- · define the term information security and its needs;
- · understand the terms: Integrity, Availability and Confidentiality;
- · differentiate different types of attacks;
- · define safety measures for an information security system against these attacks; and
- · understand and make Guidelines for secure information security system.
Comments
Post a Comment