Xem mẫu

General Security Concepts Contents Understanding Information Security Understanding the Goals of Information Security Comprehending the Security Process Authentication Issues to Consider Distinguishing between Security Topologies Terminologies Protocol: an official set of steps or language for communication Algorithm: a specific set of steps to solve a problem or do some task String: a series of characters. Example if a character can be a-z and 0-9 an 8 character string might be “ar01z14b” Control: a countermeasure or attempt to mitigate a security risk. A firewall is technical control. Policies are HR controls. Encryption is a technical control. Information Security Security? Physical security of servers and workstations Protecting data from viruses and worms or from hackers and miscreants The capability to restore files if a user accidentally deletes them … Problems with security: It is next to impossible for everyone to agree on what it means We don’t really mean that we want things to be completely secured While everyone wants security, no one wants to be inconvenienced by it Security Triad ... - --nqh--
nguon tai.lieu . vn