Introducing
Your new presentation assistant.
Refine, enhance, and tailor your content, source relevant images, and edit visuals quicker than ever before.
Trending searches
LECTURE
Information Security Risk - a set of conditions and factors that create a potential or actual violation of the existing danger of information security.
• accidents and disasters (fire, earthquake, hurricane, flood, etc.);
• faults and failures of hardware;
• design and development component error AS (software and data processing technology, hardware, etc.);
• operating error;
• deliberate actions of violators.
There are many criteria for classifying threats. Consider the most common ones:
criteria 1
Natural threats - a threat caused by exposure to the AS and its objective elements of natural physical processes or natural phenomena, independent of man. In turn, artificial threat - a threat to the AS, caused by human activities.
criteria 2
The first related to the different kinds of errors - in the design of the AS, in the software, human error when working with the AS and etc. The second group is related to the self-serving, and other ideological goals of people, in this case, the intruders. The reason may be to obtain material gain, revenge, moral beliefs, and so forth.
criteria 3
As an example, external threats can be to intercept data transmitted over the network or through a leak PEMIN. The internal threats include theft of media with confidential information, damage to equipment, the use of various types of bookmarks.
criteria 4
Passive threats - threats that do not violate the composition and the normal operation of the AS. Example - copying of confidential information leakage through technical channels of leakage, eavesdropping, etc. Active threat, respectively, disrupts the normal functioning of the AS, its structure or composition.
criteria 5
criteria 6
a system based on a stand-alone workstation and system having a connection to the PSTN.
criteria 7
Malicious program (in the jargon of the anti-virus services, "malware", English malware, malicious software -. «Malicious software") - any software designed to gain unauthorized access to computing resources most computer or information stored on the computer, with the purpose of unauthorized owner use computer resources or damage (damage) owner information, and / or the owner of a computer and / or the owner of the computer network by copying, distortion, deletion or substitution of information.
Information security is a confrontation of information security specialists and hackers.
The attacker - a subject who illegally trying to obtain, modify or destroy data of legitimate users.
Confidentiality, integrity and availability are the three most important properties of the information in the framework of its safety:
• confidentiality of information - the state of the information in which access to it is carried out only entities that have a right to it;
• integrity of the information - the state of the information for which there is no any change in any change is only intentionally subjects have a right to it;
• the availability of information - the state of the information in which entities with access rights can sell them freely.
Legal protection - protection of information by legal methods, including the development of legislative and regulatory documents (acts) that regulate subjects regarding the protection of information, the use of these documents (acts), as well as supervision and control over their execution.
Organizational security measures - organizational measures designed to regulate the functioning of information systems, staff performance, users interact with the system.
Technical protection of information - data protection is to ensure not cryptographic methods of safety information (data) to be protection in accordance with applicable law, the application of technical, software and software and hardware.
Antivirus software
It's recommended to always use an antivirus program on your PC – even when antivirus software can't protect your computer against all viruses.
Digital signature - is the resulting cryptographic (encryption) transformation of information using a private key signature props electronic document designed to protect the document from forgery, as well as from unauthorized changes. In fact, the electronic signature - a full, having the same legal effect as handwritten signature analogue, bonded stamp.
From a practical point of view of electronic signature is used in electronic document management systems, and for participation in electronic auctions.