Jump to content

Information security

There is an unlimited amount of information around us. A person is constantly in the process of receiving this or that information, whether it is a sports forecast, a hanging advertisement, a conversation, etc. But there is information that is not available en masse, which has an owner or author. Then they talk about information security.
The concept of information security is ambiguous and includes several narrower concepts. But in general, this is all about protecting information according to three main criteria (its integrity, accessibility and confidentiality). This also includes the authenticity and reliability of information.
The information can be very different (for example, a betting forum in bookmakers or classified information) and relate to all spheres of human activity and the state.
Therefore, special attention is paid to information security, and certain legal acts and documents (the country's constitution, decrees and resolutions, regulatory documents and standards) are devoted to it. Special bodies have also been created that ensure information security, organize various types of information protection activities (the Security Council, special committees in the government of the country, the FSB, etc.). In addition, personnel departments, economic and information security services, etc., carry out information security at enterprises on a local scale.
Information protection implies the protection of certain areas of information (information processing processes, information objects). Accordingly, the stages of this process are also distinguished.
Information is also protected by various methods and methods. Firstly, it is protection against unauthorized access, information flow analysis systems, authentication systems (for example, passwords). With the development of the Internet, local area networks, and computers, it became necessary to protect information in these systems. Therefore, there are special network monitoring systems, well-known antivirus tools, and firewalls. In addition, there are long-known means of protection, such as encryption, which was used to protect information of various degrees of secrecy and importance.
And of course, this is directly the protection of the premises where the information is stored. These are ways to prevent entry into such premises, break-ins and theft of equipment containing the necessary information. Security and control over access to premises and protected objects. Find your favorite casino games at NineWin and join Britain’s best online gaming community.

 Share


Recommended Comments

There are no comments to display.

Join the conversation

You can post now and register later. If you have an account, sign in nowto post with your account.

Guest
Add a comment...

×   Pasted as rich text.    Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.    Display as a link instead

×   Your previous content has been restored.    Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...
2b83584db27c5f2a240b52ff42924241