Essential Principles of Information Security and Protection
Classified in Electronics
Written on in
English with a size of 3.25 KB
Understanding Information Security
Security is the characteristic of any system that indicates it is free from danger, harm, or risk.
Core Security Objectives
- Confidentiality: Ensuring that information is accessible only to authorized parties.
- Integrity: Protecting the accuracy and completeness of information and processing methods.
- Availability: Ensuring that authorized users have reliable access to information and resources.
Assets Requiring Protection
- Hardware: Vulnerable to voltage drops and physical faults. Solution: Replace or repair equipment.
- Software: Vulnerable to viruses and corruption. Solution: Reinstall software.
- Data: The most threatened asset and the most difficult to recover. Recovery is only possible if regular backups are maintained.
Logical Threats
These are produced by programs that may damage the system:
Intentional Threats
- Viruses
- Malware
- Trojans
- Malicious use of security tools
- Unauthorized access via backdoors
Accidental Threats
Produced by human error or system failure.
Safety Measures and System Security
Active vs. Passive Security
- Active Security: Measures that require ongoing management.
- Passive Security: Measures that are installed and function automatically.
Security Measurements
- Prevention: Increasing system security during normal operation.
- Passwords: Complex credentials set to deter intruders.
- Access Permissions: Establishing specific resource access levels for users.
- Secure Communications: Using cryptographic mechanisms, such as password encryption and digital signatures.
- Updates: Regularly upgrading the OS and antivirus software to ensure system stability.
- UPS: Providing power during outages to allow for data saving and proper equipment shutdown.
- Detection: Utilizing antivirus, firewalls, and anti-spyware tools.
- Recovery: Restoring the system after alterations, viruses, or bugs occur, primarily through backups.
Malware: Malicious Software
Malware is any program designed to be harmful to a computer, causing data loss or reduced productivity.
Common Types of Malware
- Virus: A program installed without user knowledge, designed to spread or execute specific actions.
- Zombies: Compromised computers controlled remotely by a third party.
- Trojans: Programs that appear legitimate but gather information or perform malicious tasks in the background.
- Worms: Programs that self-replicate to infect networks, often causing traffic saturation.
- Backdoors: Methods used to bypass normal authentication.
- Adware: Software that displays intrusive pop-up or pop-under advertisements.