Information Security
domingo, 29 de julio de 2018
Conclusión
En conclusión este blogg trata de la seguridad informática, como sabemos que los hackeos hoy en día son muy comunes, entonces tenenos que estar al tanto de todo eso, sabernos informar bien y poder proteger nuestras cuentas, ya que existen intrusos que pueden tomar nuestra información personal, hay que tomar en cuenta todos los consejos y todo lo que dice este blogg, esperando que pueda ayudar en mucho a proteger su información.
En este blogg se presentan importantes temas, como los actos de vandalismo y seguridad informatica, hay que tomar en cuenta todo lo que dice en este blogg para poder prevenir cualquier daño a nuestra información.
Ahora una pregunta........ Dejen sus comentarios♡
¿Con sus palabras, que creen que es seguridad informática?
En este blogg se presentan importantes temas, como los actos de vandalismo y seguridad informatica, hay que tomar en cuenta todo lo que dice en este blogg para poder prevenir cualquier daño a nuestra información.
Ahora una pregunta........ Dejen sus comentarios♡
¿Con sus palabras, que creen que es seguridad informática?
Deliberate Act of Trespass
INFORMATIC SECURITY
Guarantee the integrity, availability and privacy of the information contained in a computer system
Allow the distinction of classes of users, with different authorizations on the use of system resources
Computer security is a broad subject, covering among other things: the work modes of people, the physical security devices and the internal security of the machine and the operating system.
External security: referring to the facilities of the computer system and the access of people to the system and its information.
Contemplate these two areas:
Physical security. Of the facilities. It includes measures for the prevention or recovery of accidents, and control of access to the system.
Operational safety Security policies and mechanisms: levels of authorization or responsibility, access methods, communication protocols ...
Internal security: the one that refers to the circuitry of the system, or security issues of the operating system.
PROTECTION: Part of the internal security related to access control of programs, processes or users to the resources of a computer system.
Types of threats
against the integrity of the system
Negligent or incorrect use
Claims (physical damage to the system)
Unauthorized or improper use
Sabotage (deliberate act of altering the functioning of the system)
These threats can be accidental or intentional.
Intrusion: Unauthorized or improper entry into the system. Also called penetration.
- unauthorized access to info.
- that an organization is trying to protect low-tech: shoulder surfing high-tech: hacking.
INFORMATIC SECURITY
Guarantee the integrity, availability and privacy of the information contained in a computer system
Allow the distinction of classes of users, with different authorizations on the use of system resources
Computer security is a broad subject, covering among other things: the work modes of people, the physical security devices and the internal security of the machine and the operating system.
External security: referring to the facilities of the computer system and the access of people to the system and its information.
Contemplate these two areas:
Physical security. Of the facilities. It includes measures for the prevention or recovery of accidents, and control of access to the system.
Operational safety Security policies and mechanisms: levels of authorization or responsibility, access methods, communication protocols ...
Internal security: the one that refers to the circuitry of the system, or security issues of the operating system.
PROTECTION: Part of the internal security related to access control of programs, processes or users to the resources of a computer system.
Types of threats
against the integrity of the system
Negligent or incorrect use
Claims (physical damage to the system)
Unauthorized or improper use
Sabotage (deliberate act of altering the functioning of the system)
These threats can be accidental or intentional.
Intrusion: Unauthorized or improper entry into the system. Also called penetration.
martes, 24 de julio de 2018
Deliberate Act of Sabotage or Vandalism
Deliberate
Act of Sabotage or Vandalism
acts
aimed to destroy an information
asset
and, ultimately, damage the
image
of an organization
example:
hackers
accessing a system and damaging
or
destroying critical data
Vandalism:
refers
to the total or partial voluntary destruction of public or
private
property. It includes concepts such as damage to heritage,
graffiti
or acts of provocation or activism, such as culture jamming
or
different types of actions on the internet, such as billboard
hacking
or defacement of websites. Vandalism can also be considered a
form
of social protest, as the proponents of the broken windows
theory,
James Q. Wilson and George L. Kelling, point out, as soon as
community
barriers are relaxed by actions that signal that Nobody
cares,
vandalism can occur.
Although
it lapses in some of its concepts with those of iconoclasm, unlike
this,
also a destructive public act, vandalism tends more to be
random or
meaningless and it seems that, at least in some cases,
vandals
enjoy somehow of the vandalic act, either because it is a
sample of
its capacity to damage and destroy or even to verify the
reaction
that its actions produce in others.
Sabotage:
Damage or deterioration in facilities, products, etc., is done
as a procedure to fight against employers, against the State or
against occupation forces in social or political conflicts.
sabotage
affects the area of informatics because credentials or personal
data are in danger, as there are many people wanting to do damage, in
the area of information technology, banks and businesses are
affected as they have personal data of their clients and also for can
steal money, this is common and that is why you have to have a good
security system.
jueves, 19 de julio de 2018
Deliberate
Act of Info. Extortion / Blackmail
Blackmail:
Blackmail It is the threat of public defamation or any other damage to obtain some pecuniary or material gain from someone or force him to act in a certain way.
Blackmail or extortion is a crime in the legal system.
Extortion:
Extortion is a crime consisting of forcing a person, through the use of violence or intimidation, to make or omit a legal act or business with profit motive and with the intention of producing a damage of patrimonial character or of the subject passive, well of a third party.
Hacker
It
is every individual who is dedicated to programming enthusiastically,
that is, an enthusiastic expert of any kind, "who believes that
making information available to everyone is an extraordinary asset.
Security
threat
Any
action/inaction that could
cause
disclosure, alteration, loss, damage or
unavailability
of a company’s/individual’s assets
In
computer security, a threat is a possible danger that might
exploit a vulnerability to breach security and therefore cause
possible harm.
A
threat can be either "intentional" (i.e. hacking: an
individual cracker or a criminal organization) or "accidental"
(e.g. the possibility of a computer malfunctioning, or the
possibility of a natural disaster such as an earthquake, a fire, or a
tornado) or otherwise a circumstance, capability, action, or event.
There
are three components of threat:
Targets:
organization’s
asset that might be attacked information(its confidentiality,
integrity, availability),software,
hardware,
network service, system resource, etc.
Agents:
people
or organizations originating the threat,intentional or
non-intentional employees, ex-employees, hackers, commercial rivals,
terrorists,criminals, general public, customer.
Events:
type
of action that poses the threat misuse of authorized information,
malicious / accidental alteration of information, malicious /
accidental destruction of information, etc.
Suscribirse a:
Comentarios (Atom)





