- Principles of information security
- Integrity means the capability of data to keep the original form and structure during storing and after repeated transfers. Only the owner or user with legal access to the data has the right to edit, delete or supplement the information.
- Confidentiality reveals the need to restrict access to information resources for a certain circle of people. During actions and operations, information is only accessible to users who are included in the information systems and have been successfully authenticated.
- Accessibility means that public information should be made available to authorized users of resources in a timely and unhindered manner.
- Authenticity shows that the information belongs to a trusted person or owner who at the same time acts as a source of information.
- Provision and sustainment of information security involves a set of various measures to prevent, monitor and eliminate unauthorized third-party access. Information security measures are also aimed at protection from damaging, distorting, blocking or copying information. All tasks should be addressed simultaneously, only then complete and reliable protection is ensured.
- Main questions about the information protection method are especially acute when hacking or theft with distortion of information lead to severe consequences or financial damages.
- There is the following logical chain of information transformation created with modeling:
Types of information security threats - Information threat is a potentially possible influence or impact on an automated system with the subsequent damage to someone's needs.
- To date, there exist more than one hundred positions and types of threats to the information system. It is extremely important to analyze all risks using different diagnostic techniques. Based on the analyzed detailed indicators, you can competently build a system of protection against threats in the information space.
Do'stlaringiz bilan baham: |