Information Security is concerned with protecting information and information resources. Information can be protected with the help of elements are : Prevention, Detection and Response
Prevention: the action of stopping something from happening or arising.
(i) Access Controls
(ii) Firewalls
(ii) Encryption
Access control is a method of guaranteeing that users are who they say they are and that they have the appropriate access to information of organisation. At a high level, access control is a selective restriction of access to information. It consists of two main components: authentication and authorisation. Access control is a security technique that regulates who or what can view or use resources in a computing environment. ... Physical access control limits access to campuses, buildings, rooms and physical IT assets.
A firewall is a security device — computer hardware or software — that can help protect your network by filtering traffic and blocking outsiders from gaining unauthorized access to the private data/information on your computer. ... Firewalls can provide different levels of protection. A firewall can be implemented in either hardware or software form, or a combination of both. Firewalls prevent unauthorized Internet users from accessing private networks connected to the internet, especially intranets.
Encryption is the process of converting information or data into a code, especially to prevent unauthorized access. Data or information, encryption translates data or information into another form, or code, so that only people with access to a secret key (formally called a decryption key) or password can read it. The plaintext is the original form of message and Encrypted data is commonly referred to as ciphertext.
0 comments:
Post a Comment