Page 36 - DCAP309_INFORMATION_SECURITY_AND_PRIVACY
P. 36

Information Security and Privacy




                    Notes          supposedly trusted employees defrauding a system, from outside hackers, or from careless data
                                   entry clerks.
                                   Precision in estimating information security-related losses is not possible because many losses
                                   are never discovered, and others are “swept under the carpet” to avoid unfavorable publicity.
                                   The effects of various threats vary considerably: some affect the confidentiality or integrity of
                                   data while others affect the availability of a system.
                                   This unit will help you to understand some of the security pillars and principles. In many ways,
                                   information security is almost a statistical game. You can reduce but not eliminate the chance
                                   that you may be penetrated by an intruder or virus.

                                   3.1 Information Security


                                   Information security can be very complex and may be very confusing to many people. It can
                                   even be a  controversial subject. Network administrators  like to  believe that their network is
                                   secure and those who  break into networks may like to believe that they can break into any
                                   network.
                                   Information security is  the prevention and protection of computer  assets from unauthorized
                                   access,  use,  alteration,  degradation, destruction,  and  other  threats.  There  are two  main
                                   sub-types: physical and logical.

                                   Physical information security involves tangible protection devices.

                                          Example: Locks, cables, fences, safes or vaults.

                                   Logical information security involves non-physical protection.

                                          Example: Protection provided by authentication or encryption schemes.

                                   Make a point of noting that the physical versus non-physical (logical) distinction runs through
                                   a number of areas in computer science, despite minor differences in definition.





                                      Task  What are the two sub-types of information technology? Illustrate.
                                   3.1.1 Need for Information Security


                                   Information security is as much a business process as it is a technical one. No longer can security
                                   be viewed as a backroom operation, separate from the essential activity of an organization.

                                   Information security means protecting information and information systems from unauthorized
                                   access, use, disclosure, disruption, modification or destruction. Governments, military, financial
                                   institutions, hospitals, and private businesses amass a great deal  of confidential information
                                   about their employees, customers, products, research and financial status.
                                   Information assets are critical to any business and vital to the survival of any organization in
                                   today’s  globalize digital  economy.  Information  leak is  therefore intolerable.  Confidential
                                   information about a businesses customers or finances or new product line fall into the hands of
                                   a competitor, such a breach of security could lead to lost business, law suits or even bankruptcy
                                   of the business.






          30                                LOVELY PROFESSIONAL UNIVERSITY
   31   32   33   34   35   36   37   38   39   40   41