×
The concept of information security

The concept of information security


Information security is the protection of information and data circulating over the Internet from tampering, sabotage and alteration, or from any danger that threatens it, such as the access of any person who is not authorized to access it and tamper with its data and access to it, by providing the necessary means and methods to protect it from internal and external risks, and the subject of information security is an old topic, but the need and demand for it increased with the spread of Internet use and reliance on it in all areas of life, which required the transfer of data and information over multiple networks, and also allowed the spread of Social networks are an urgent need for this. 


Elements of confidential information security: 

means preventing anyone who is not authorized from accessing another person's data.


 Integrity and data integrity: 

Integration here means preserving data from modification or change by people who are not authorized to access it, such as if a person intentionally or unintentionally accesses data that he is not allowed to access, as well as in the event that a virus reaches the computer and modifies its data, this is also a violation of integrity and the lack of full protection of information.


Data availability:

 It means that complete data is available when needed so that it is correct and accurate information that is not modified or incomplete, making the elements of the system work properly.


 Information Security Threat Viruses: 

They are small programs written in the computer language that access the data stored on it and tamper with it, and some of them may be hidden and cannot be seen and observed, and the source of viruses is from Internet sites, unreliable e-mails, and imitation programs that are not original, and these viruses may spread when using storage means without making sure that they are free of viruses. 


Denial-of-service attack:

 It is an attack carried out by a hacker or hacker in order to disable the server service in the network. 


Attack transmitted information:

 It is the process of intercepting and tampering with messages sent from one party to another like emails. 


Full hacking attack:

It is to control the victim's computer and tamper with all its files and data. 


Data protection means Among the simplest types of protection methods used are passwords, smart cards and biological means such as the use of fingerprints and eye flutter, the use of encrypted keys such as electronic locks, the development of anti-virus programs and the development of systems that detect and process intrusions, and the work of backups of data after completing every work we do, and the use of strong systems to encrypt data and spread awareness among users of the Internet, all of these may be means in order to ensure that no one has access to data and information, and these means of protection It provided a lot of security for institutions and companies that rely on the Internet and on electronic devices and systems such as banks, universities, hospitals, military and security institutions.