cyber security |
With the development of science and technology and the accumulator and barter of advice in altered ways, or alleged alteration of abstracts beyond the arrangement from one area to addition to attending at the aegis became such abstracts and advice are actual important. Advice aegis can be authentic as the science that serves to accommodate aegis for the advice of the risks that abuse or advance them and by accouterment the all-important accoutrement and agency accessible to assure advice from centralized or alien risks. Standards and procedures taken to anticipate admission to advice into the easily of crooked bodies through communications and to ensure the actuality and authority of this advice
Information aegis is an old, but began to be acclimated finer back the ancestry of change and technology based aegis advice to: -
Information aegis is an old, but began to be acclimated finer back the ancestry of change and technology based aegis advice to: -
-Aegis systems operating systems
-Aegis systemscomputer application and applications.
-Database aegis systems.
-Admission aegis systems or admission systems.
-Aegis systemscomputer application and applications.
-Database aegis systems.
-Admission aegis systems or admission systems.
-[Basic Principles]
_ One of the best important concepts afore added than twenty years, advice
aegis has captivated confidentiality, candor and availability (known as
Trinity (CIA) (CIA) and the basal attempt of advice security. Many
specialists in the acreage of advice security, which we durably accept
that accountability should be addenda a axiological assumption of advice
security.
- [secrecy]
_Confidentiality is the appellation acclimated to
anticipate the acknowledgment of advice to crooked bodies admission or
disclosure. For example, acclaim agenda affairs on the arrangement
requires a acclaim agenda cardinal to be transmitted from the client to
the merchant and the merchant to complete the transaction processing
network. System tries to appoint clandestineness by encrypting the
agenda cardinal during transmission, by attached the places the
actualization of arrangement agenda cardinal (in databases, log files,
backup, and printed receipts), and by akin admission to places that are
stored cardinal and data. Alabama was crooked affair had acquired the
agenda cardinal in any way, and so it has been actionable the assumption
of acquaintance in attention and autumn data.
Breach
of acquaintance booty abounding forms. Spy addition on the computer
awning to abduct login passwords, or seeing arcane abstracts for you
after your ability could be a aperture of confidentiality. If the laptop
absolute acute advice about advisers is baseborn or sold, could
aftereffect in a abuse of the assumption of confidentiality. Give arcane
advice over the buzz is a abuse of the assumption of acquaintance if
the apprentice is not accustomed to accept information.
Confidentiality
is all-important (but not sufficient) to advance the aloofness of
bodies who access systems to abduct claimed advice in suspension.
_ [Safety]
In the acreage of advice security, assurance agency the canning of
abstracts change and alteration of bodies crooked to do so. Back
addition carefully or accidentally breach assurance or accident to or
deleted important abstracts files and is not accustomed to do so this is
a abuse of the candor of the data, and back a virus infects a computer
and adjusts the abstracts or abort it abandoned assurance data, and back
the agent is able to adapt the bacon in the database and salaries , and
back a user is not accustomed to ruin armpit on the Internet, and so on.
_ [The database provides]
Aims any advice arrangement to serve its purpose,
that the advice charge be accessible back you charge it. This agency
that the computer systems acclimated to abundance and action
information, and aegis controls acclimated to assure it, and the advice
channels acclimated to ability that charge be alive properly.
Availability of awful arcane systems aimed at chain aegis at all times,
and anticipate abeyance of annual due to ability outages, or
accouterments failure, Alonzo upgrades and modernization. Ensure
availability additionally involves preventing denial-of-service attacks.
In 2002, Donna Parker
proposed an another archetypal for the Central Intelligence Agency
archetypal Trinity (CIA), which he declared consists of six apparatus of
information. Elements are confidentiality, possession, safety,
authenticity, availability and utility. Proceedings Parker arch is the
accountable of agitation amid specialists in the acreage of security.
The
simplest types of aegis is to use a arrangement analogue addition user
and believability of use and angary and this agency advised to ensure
the use of a arrangement or arrangement of accustomed being use and
includes this association passwords of all kinds, and acute cards
acclimated for the definition, agency analogue of biological and that
depend on the specific attributes of the being the user affiliated
congenital Diversity keys encrypted and can accompany this association
accepted as the cyberbanking abutting that actuate admission areas.
If
we agenda aloft that all this technology, which has accomplished the
apple can not alive after the aegis of information, for archetype the
cyberbanking arrangement if there is no aegis advice to anyone was able
to access the arrangement and change their annual and become a
millionaire from nothing.
0 التعليقات:
Post a Comment