Xem mẫu
General Security Concepts
Contents
Understanding Information Security
Understanding the Goals of Information Security
Comprehending the Security Process
Authentication Issues to Consider
Distinguishing between Security Topologies
Terminologies
Protocol: an official set of steps or language for communication
Algorithm: a specific set of steps to solve a problem or do some task
String: a series of characters. Example if a character can be a-z and 0-9 an 8 character string might be “ar01z14b”
Control: a countermeasure or attempt to mitigate a security risk.
A firewall is technical control. Policies are HR controls. Encryption is a technical control.
Information Security
Security?
Physical security of servers and workstations
Protecting data from viruses and worms or from hackers and miscreants
The capability to restore files if a user accidentally deletes them
…
Problems with security:
It is next to impossible for everyone to agree on what it means
We don’t really mean that we want things to be completely secured
While everyone wants security, no one wants to be inconvenienced by it
Security Triad
...
- --nqh--
nguon tai.lieu . vn