PCs ENVIRONMENT and PERIPHERALS Lecture 9

advertisement
PCs ENVIRONMENT and
PERIPHERALS
Lecture 9
Information Security:
What is it ?
- Information security means protecting information and
information systems from unauthorized access, use,
modification or destruction.
Information Security:
* Information security, computer security and information
assurance:- These fields are interrelated often and share the common
goal of protecting the confidentiality , integrity and
availability of information.
- However, there are some differences between them.
- The differences in the methodologies used and the areas
of concentration.
Information Security:
1- Information security:
- Is concerned with the confidentiality, integrity and
availability of data regardless of the form, the data may
take:
Electronic, print or other form.
Information Security:
2-Computer security :
- Computer security can focus on ensuring the availability
and correct operation of a computer system without
concern for the information stored or processed by the
computer.
Information Security:
3- information assurance:
- Focus on how to ensure the data and managing risks
related to the use, processing, storage, and transmission
of information or data and the systems used for those
purposes.
Key concepts:
CIA :
- For over twenty years, information security has held that
Confidentiality, Integrity and Availability(known as CIA
Triad) as the core principles of information security.
1- Confidentiality:
- is the term used to prevent the disclosure of information
to unauthorized individuals or systems.
- Breaches of confidentiality :
- Many forms :
1- Permitting someone to look at your computer screen
when your confidential data displayed on it
 could be a breach of confidentiality.
1- Confidentiality:
2- if a computer or laptop computer containing sensitive
information and a company’s employees is stolen or sold
 it could result in a breach of confidentiality.
2- Integrity:
- In information security, integrity means that data cannot
be modified without authorization.
- Many ways may violated integrity by malicious intent or
without malicious intent.
2- Integrity:
-
Malicious intent :
1- an employee deletes important data files with malicious
intent.
2- when a computer virus infect a computer.
3- when an employee is able to modify his own salary in a
payroll database.
2- Integrity:
-
Without malicious intent:
1- an employee accidentally or without malicious intent
deletes important data files.
2- The user forgets to type some information.
3- If a database update in a wrong way.
3- Availability:
- For any information system, the information must be
available when it is needed.
Availability is violated :
- When a user forget a username or password.
- Hardware failures(by any reason).
Download