Tuesday, 14 May 2019

Information security risks and how to address them

Information security risks and how to address them

Information Security (Information Security) A specialist in securing information transmitted via the Internet from the risks that threaten it. With the development of technology and means of storing and exchanging information in different ways or so-called data transmission over the network from one location to another, the security of these data and information is a concern and a vital issue is very important. Information security can be defined as a science that protects information from threats or a barrier to attack by providing tools and means to protect information from internal or external risks. Standards and procedures taken to prevent the access of information to unauthorized persons through communications and to ensure the authenticity and validity of such communications.

Among the most prominent electronic threats are:
Impersonation takes place in several ways, including:
Guess your username and password, which makes it easier if your username and password are easy or meaningful to the account holder (such as their name and date of birth).
Send messages to respondents asking them to update their bank or other data via links that contain pages similar to the original site while the data goes to the page's author.
Use devices or programs that record everything you click on the keyboard and send it to a specific mail.
Direct contact with the target and claim that he is an employee of a company or bank and requests confidential information on the pretext of updating the system or the like.

The information is obtained in this way by tapping the data packets as they travel through the computer networks, making it easier for packets to be unencrypted.

Programs designed and written by professional programmers aim to execute certain commands in the victim's device such as damage to the computer and the contents of the data or open ports in the computer through which it can penetrate and monitor ..

The virus
Executive programs aimed at achieving specific goals or causing a defect in the computer system ..

reason of calling? Because it is able to copy itself and spread quickly through the means of communication, such as e-mail ..
target of? Achieve specific goals ..

Trojans :
Because of the famous story of the Trojan horse, where the soldiers took the yuan inside the horse and were able to storm the Trojan and overcome the army thus this virus is accompanied with a program without the user's knowledge ..
target of? Data theft and password detection and bank accounts ..

Attempting to access the systems and devices of individuals or organizations and companies using special programs through gaps in order to obtain information or sabotage these systems and harm them
The type of penetration is limited to knowing the contents of the target system continuously without damaging it ..
Examples of incidents of violation of information security:
The arrest of a hacker stole an e-mail and tampering with its contents ..
Arrested five events they stole large sums of money from a bank using magnetic cards ..
The arrest of a citizen who infiltrated another citizen's device and obtained his files.
Hackers attack the Ministries of Interior and Justice in one of the countries ..
Spread of the virus of love via e-mail in 2000 ..

No comments:

Post a Comment

Comments System