SECURITY
The quality or condition of being safe to be free from the danger that protects from disasters. A successful organization has many layers of security such as physical security, personal security, operational security, communication security, network security. In simple words, security is who protects from unwanted disaster and give protection.
INFORMATION SECURITY
Information security is not about obtaining information from unauthorized access, but it is more than that. Rather, information security is the practice of preventing unauthorized access, disclosure, use, modification, interference, inspection, recording, or destruction of information. This information can be electrical or physical. Information can be anything like your details (i.e. your personal information) or we can say your profile on social media, your data in mobile phone, your biometrics, etc., all this information is related to you. Going forward, this information security spreads to many research areas such as cryptography, cyber forensics, mobile computing, online social media, etc.
WHAT IS AN INFORMATION SECURITY
It is necessary to protect information and its critical elements, including systems and hardware that use, store, and transmit that information. All these tools are important for information security such as policy, awareness, training, education, and technologies are essential.
It is also called Infosys. Infosys deals with protecting security from unauthorized access. This information is part of risk management. This includes things like preventing or reducing the possibility of unauthorized access, interference, use, interference, deletion, disclosure, corruption, modification, inspection, or recording. If a security incident occurs, information security professionals are involved in reducing the negative impact of the incident, that is, it tries to prevent it. Information can be in any form, electronic or physical, tangible or intangible.
Information security programs are designed for about 3 purposes.
Commonly known as CIA –
Privacy,
Integrity,
Availability
Confidentiality – Confidentiality means that information about unauthorized persons, entities, and the process is not disclosed. Example: If we say that I have the password for my Gmail account, but if someone saw that I was logging into the Gmail account and they came to know about my password. In that case, my Gmail password can be compromised and for this reason, privacy is breached.
Integrity – Integrity means maintaining the accuracy and completeness of data. Integrity means that data cannot be edited in an unauthorized way. Example: An employee leaves an organization. So the data in all departments like accounts for that employee should be updated in JOB LEFT as per the situation. So that the data is a complete and accurate and only authorized person is allowed to edit employee data.
Availability – Availability means information should be available when needed. Example: If one has to use the information of a particular employee to understand the number of leaves of the employee. So, in that case, it needs cooperation from various organizational teams such as network development operations, incident response, operations, and policy/change management. Denial of service attack is a factor that can hinder the availability of information.
INFORMATION SECURITY THREATS
A variety of threats can occur including identity theft, software attacks, sabotage, physical theft, and information extortion:
• Software attacks on information security include Trojan horses such as viruses, malware, worms, ransomware.
• The purpose of a phishing email or website is often to log into credentials to steal intellectual property. Social engineering is one of the biggest dangers of cyber threats. With traditional security measures, it has become more difficult to protect.
• Fears such as a denial of service attacks are often to reduce the availability of key information assets, reducing confidence or organizational productivity until the organization receives payment in return for returning the service.
• Theft of information and equipment has become commonplace now as most of the devices are now mobile like smartphones or laptops.
• Information extortion involves acquiring access to confidential information and then holding ransom until payment is made.
By Chavi Priya :
Identity theft probably is the biggest concern when it comes to our country and related cybercrimes. And due to th lack of knowledge..there is hardly anything people can do .
Information security uses traditional methods in order to protect presonal information, maybe a better method can be designed and used which offers more security. The personal information available should only be accessed when permission is granted by the authority incharge or by the person whose information is stored, this can lessen the risk. Eg -OTP can be the way to access the information stored.
Security is the state of being free from danger. Its high time the people come up with having conversations over informatiom security and keeping their personal and day to day life a bit restricted. The digital platform is a wide area and it comes with both pros and cons. While it makes our life easier to live, it also makes it difficult at times due to third party interruption in our social media accounts. People are made victims of cybercrimes and threatened online. Due to lack of knowledge the victims cant even take further actions on it.
This article provides an overview of security of the information and how to use and handle it.
Informative article
well explained the security related challenges to the users and what laws says about it.
This article provides us well electorate laws and security related challenges
well informative and up to the point article
The article speaks about the challenges globally but should also include data of India and Indian laws also. Unless very informative and helpful for researchers.
Security is major to us. as we dont discuss our problem in public it remains private we should maitain all this decoram in online world also.
Really good article it really help me to understand things easily
Threats of information security is well explained. There is a need for articles like this explaining people about the depths of security as well as the protection from any sort of crime.
Finding all the important details at a single place is hard , but this article mostly covers everything , would like to see one which goes in greater depth and understanding।
This article mainly discusses the crucial issue of security. It explains the purpose of information security and its threats. Personal information should be secured because they are misused in many ways. We have the famous judgment of K.S.Puttaswamy v UOI related to the right to privacy matter and it should be maintained.
The article at basic key note is dealing with the concept and mechanism of information security. At larger point if said, it has much relevance in our day to day lives. for eg- for various departments, organizations, firms, government agencies, companies, etc. All of them are having a lot of infomation saved say be online or in devices. These are the ones having really confidential matter. In today’s era there is a lot need for advance in digital forensics, cyber forensics, as day to day advancements in the rate and varieties of cyber crimes increasing day by day, to protect such informations.The article would have turned to be more interesting if certain laws and cases would have also be brought in with plenty of suggestions, helping readers more know about the topic…..
This article effectively explains how information security and its threat. In this digital era any individual, organisation, company, or even the government stores its information online. thus it becomes necessary to protect this information from any cyberattacks and threats. this article explains everynthing in this regard.
A very well versed and informative article about Information security ,which has become a major part in all our lives . The author has also talked about the CIA triad which lays the basis of information security . A good article which must be read by everyone to know what cybersecurity is . Although the article could be much elaborate and could have explained a lot more ,but still , i feel its a good read.
The article deals with the concept and mechanism of information security. The article also explains the threats of information security. This article is an outstanding one which is highly informative that one can be aware of the information security threats
Overall good article. But i think this information can get easily by googling. I started to read this article because it was written by research Intern so think it was interesting and gives information about his own research on this topic.Does not meet the expectations but thank for your valuable time and practices to write this informative article.
this article clear some of my confusion regarding information security. thank you for the information.
Thanks, great article