Let’s know about Information security basics 

 

Information security will help you avoid and leave websites that are not related to you.
When you are entering strange sites are vulnerable to exploitation.
Whether by achieving gains or secrets and personal data.

also peekerscitech was talked about benefits of information security 

information security basics 

Advantages of information security 

firstly information security basics feature Confidentiality, Integrity, and Availability.
Then, Knowing the weaknesses that are the basis for keeping the safety.

and Dividing vulnerabilities and discussing whether there are security vulnerabilities in the programs.
And security controls.

 third, Major categories of security control.
People-related concepts are

authentication, authorization, and non-repudiation

there are six advantages of information security:

1-security

 above all, Information if reads or copied in an unauthorized manner.

also, The result is a loss of confidentiality.
and It includes Research data and medical and insurance records or Legal obligation to protect the privacy of individuals.
also, It can destroy information and change when it’s on an unsafe network
or modified in an unexpected way.

 

2-integrity

 

firstly it is to make unauthorized changes either by mistake or intentional manipulation.
Such as Electronic funds transfers and air traffics control.
So you can remove any information For the authorized person and do not reach to Information needed.

3- Availability

 firstly, organizations use authentication and authorization. Authentication is proving that a user is a person he or she claims to be.
  such as The directory that installs is the username or password or fingerprint.

4-Authorization

also, it is an act that proves that a person has the right to perform a particular activity such as reading a file and other.

5- Authentication

firstly All users must be authenticated before any authorized activity.
The term information security is applicable to information security concepts.
 above all, Any internet user wants to be sure with:

1-Confidence in the information they use
2-Information is available when they want
3-The processing of information is timely with the operation of sound systems
4- Information security extends to all types of information systems.

finally, No one on the internet is immune
even legal liability and the loss of life. Individuals may find that their credit
card, medical, and other private information has been compromised. Identity.

 

Reference:

Wikipedia

krestina Antoine @https://twitter.com/elianortomthy

I worked as an office manager and coordinator in the Office of Guidance Psychology. then i worked as a marketer and responsible for writing articles in various fields. And I wrote in an Arabic blog i have written since 2010

Recent Posts

Blocking  spyware in easy steps

  Blocking spyware from obtaining onto your machines may be a matter of non-public vigilance and therefore the right tools…

1 day ago

Android smartphones tricks explained for beginner

android smartphones tricks is different and it will help you to use android smartphone more Efficiency there you have to…

2 days ago

Galaxy A70 vs honor view 20, which is better

Galaxy a70 vs honor view 20 is considered both if it Uniquely distinctive Although there are Similarities between two devices,…

4 days ago

Information security jobs and best cities of it

Information security jobs are now situated across US, but particularly in business defence and government hubs Also, peekerscitech was talked…

5 days ago

Fortnite mobile vs PUBG mobile: Difference and competition

Fortnite Mobile vs PUBG mobile will find conflict and different is it better While PUBG takes a more realistic approach…

6 days ago

Social media apps in 2020 you must to know it

Social media apps help users to connect and share with people who have similar interests and backgrounds Social media apps…

6 days ago