Sign Up

Captcha Click on image to update the captcha.

Have an account? Sign In Now

Sign In

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

Have an account? Sign In Now

You must login to ask a question.

Forgot Password?

Need An Account, Sign Up Here

You must login to add post.

Forgot Password?

Need An Account, Sign Up Here

Please briefly explain why you feel this question should be reported.

Please briefly explain why you feel this answer should be reported.

Please briefly explain why you feel this user should be reported.

Sign InSign Up

Find Authority

Find Authority Logo Find Authority Logo

Find Authority Navigation

  • Home

Mobile menu

Close
Ask a Question
  • Home
  • Recent Questions
  • Topics
  • Home
Home/Questions/Q 1910
Next
In Process
Anonymous
  • 1
Anonymous
Asked: December 18, 20192019-12-18T00:39:24+00:00 2019-12-18T00:39:24+00:00In: Information Technology, Telecommunications

What is information security?

  • 1

Information security is the type of study or practice to prevent unauthorised access to any specific information. The breach of information can happen in various ways, which is why covering of all aspects of information breach comes under network security.

What are the main goals of information security?

cyber security
  • 2 2 Answers
  • 0
Share
  • Facebook

    Leave an answer
    Cancel reply

    You must login to add an answer.

    Forgot Password?

    Need An Account, Sign Up Here

    2 Answers

    • Oldest
    1. Telesignal Level 4
      2019-12-18T00:43:33+00:00Added an answer on December 18, 2019 at
      This answer was edited.

      The main step for information security is to deploy the defined security policies efficiently and then keep every process under the defined policies. Although, in professional terms, there is no facilitation of 100% guaranteed security because there is always a loophole in a system and even there are few loopholes in the models that are defined for information security.
      Some of the main components of information security include confidentiality, integrity and availability.

      Confidentiality

      Confidentiality is the protection of information from unauthorised users. To achieve confidentiality the information must need to be stored hidden or encrypted. A good example is a cryptography, which is traditionally used to protect secret messages. But cryptography is traditionally used to protect data, not resources. Resources are protected by limiting information, for example by using firewalls or address translation mechanisms.

      Integrity

      Integrity is basically to keep information protected from any modifications. In this case, modifications have several goals, such as ensure the information integrity with respect to the original information, ensure a source of data, and protect information from any incorrect modifications.
      A good example is of an interrupted database transaction, leaving the database in an inconsistent state. The trustworthiness of both data and origin affects integrity.  Cryptography provides mechanisms for detecting violations of integrity, but not preventing them (e.g., a digital signature can be used to determine if data has been changed).

      Availability

      Availability ensures that authorised users are getting access to the information. This is usually defined in terms of “quality of service” in which authorised users are expected to receive a specific level of service. Denial of service (DOS) attack is an attempt to block availability.

      • 1
      • Reply
      • Share
        Share
        • Share on Facebook
        • Share on Twitter
        • Share on LinkedIn
        • Share on WhatsApp
    2. Teleco Level 3
      2019-12-18T00:47:37+00:00Added an answer on December 18, 2019 at
      This answer was edited.

      Some main goals of information security are the detection, prevention, and recovery of information in case of any security breach.

      Prevention

      It is the prevention of attacks from violating security policies. Prevention is ideal, as there would not be any successful attacks in the first place. Prevention need to be very strong because the other goals are dependent on it.

      Detection

      As the name suggests, it detects the attacker’s violation of security. The mechanism determines that a violation of the policy has occurred (or is underway), and reports it. The system (or system security officer) must then respond appropriately. At this stage, there is still the possibility to avoid too much damage if the right steps are applied.

      Recovery

      Stop the attack and start repairing the already done damage. Recovery means that the system continues to function correctly, possibly after a period of time during which it fails to function correctly.
      If the system functions correctly after the attack, but possibly with degraded services, it is said to be intrusion tolerant. Usually, recovery means that the attack is caught and the system is being fixed (which may involve shutting down the system for some time, or making it unavailable to all users except the system security officers), and then the system resumes operations.

      • 0
      • Reply
      • Share
        Share
        • Share on Facebook
        • Share on Twitter
        • Share on LinkedIn
        • Share on WhatsApp

    Sidebar

    Advanced Search
    Ask A Question

    Related Questions

    • Do I need technical skills to use a Video Production ...

    • Customer Login Using FME Extensions in Magento 2

    • E-Commerce Migration is Difficult. How to Make it Easy?

    • What is the impact of the pandemic on global LMS ...

    • How big is the global mobile middleware market?

    Explore

    • Home
    • Recent Questions
    • Topics

    Footer

    Find Authority

    Find Authority

    Find Authority is a professional networking and crowdsourcing platform which helps enhance members credentials and create opportunities.

    About Us

    • About Us
    • Careers
    • Contact Us

    Legal Stuff

    • Terms and Conditions
    • Privacy Policy
    • Cookie Policy

    Supprt

    • Help Centre
    • Badges

    Follow

    © 2020 Find Authority. All Rights Reserved

    Insert/edit link

    Enter the destination URL

    Or link to existing content

      No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.