Sunday, April 24, 2011

Introduction To computer Security

With the growing use of Internet, more and more companies are opening their information systems to their partners or suppliers, it is essential to know the corporate resources to protect and control the control access and rights of users of the information system. It's the same at the opening of the company access the internet.


Furthermore, with the nomadism of allowing personnel to connect to the system information from any location, staff are required to "transport" part of the information system outside the secure infrastructure Company. Introduction to security The threat (in English 'Threat') represents the type of action that may affect the absolute, while the vulnerability (in English " vulnerability ", sometimes called fault or breccia) represents the level of exposure against the threat in a particular context. Finally, the measure-cons is the set of actions implemented in prevention of the threat. The cons-measures to be implemented are not only technical solutions but also measures of training and awareness for users and a set of clearly defined rules. To secure a system, it is necessary to identify potential threats and thus to know and predict the approach of the enemy. The purpose of this file and give an overview of the possible motivations of hackers, categorize them, and finally give an idea of their approach to better understand how it is possible to reduce the risk of intrusion. Click Here to Learn how to Increase Wifi security

Objectives of computer security The information system is generally defined by the set of data and hardware and software resources of the company to store them or pass them around. The information system represents a key asset of the company, which should be protected. Computer security, in general, is to ensure that hardware or software resources of an organization are only used in the space provided. Computer security is generally five main objectives: Theintegrity, that is to say, ensuring that data are those believed to be; The confidentiality, namely to ensure that only authorized persons have access to resources exchanged; The availability, to maintain the smooth functioning of information system; The non-repudiation, to guarantee that a transaction can not be denied; Theauthentication, namely to ensure that only authorized persons have access to resources.

No comments:

Post a Comment