Essential Principles of Information Security and Protection

Classified in Electronics

Written on in English with a size of 3.25 KB

Understanding Information Security

Security is the characteristic of any system that indicates it is free from danger, harm, or risk.

Core Security Objectives

  • Confidentiality: Ensuring that information is accessible only to authorized parties.
  • Integrity: Protecting the accuracy and completeness of information and processing methods.
  • Availability: Ensuring that authorized users have reliable access to information and resources.

Assets Requiring Protection

  • Hardware: Vulnerable to voltage drops and physical faults. Solution: Replace or repair equipment.
  • Software: Vulnerable to viruses and corruption. Solution: Reinstall software.
  • Data: The most threatened asset and the most difficult to recover. Recovery is only possible if regular backups are maintained.

Logical Threats

These are produced by programs that may damage the system:

Intentional Threats

  • Viruses
  • Malware
  • Trojans
  • Malicious use of security tools
  • Unauthorized access via backdoors

Accidental Threats

Produced by human error or system failure.

Safety Measures and System Security

Active vs. Passive Security

  • Active Security: Measures that require ongoing management.
  • Passive Security: Measures that are installed and function automatically.

Security Measurements

  • Prevention: Increasing system security during normal operation.
  • Passwords: Complex credentials set to deter intruders.
  • Access Permissions: Establishing specific resource access levels for users.
  • Secure Communications: Using cryptographic mechanisms, such as password encryption and digital signatures.
  • Updates: Regularly upgrading the OS and antivirus software to ensure system stability.
  • UPS: Providing power during outages to allow for data saving and proper equipment shutdown.
  • Detection: Utilizing antivirus, firewalls, and anti-spyware tools.
  • Recovery: Restoring the system after alterations, viruses, or bugs occur, primarily through backups.

Malware: Malicious Software

Malware is any program designed to be harmful to a computer, causing data loss or reduced productivity.

Common Types of Malware

  • Virus: A program installed without user knowledge, designed to spread or execute specific actions.
  • Zombies: Compromised computers controlled remotely by a third party.
  • Trojans: Programs that appear legitimate but gather information or perform malicious tasks in the background.
  • Worms: Programs that self-replicate to infect networks, often causing traffic saturation.
  • Backdoors: Methods used to bypass normal authentication.
  • Adware: Software that displays intrusive pop-up or pop-under advertisements.

Related entries: