Discover millions of ebooks, audiobooks, and so much more with a free trial

From $11.99/month after trial. Cancel anytime.

IT Security Concepts: 1, #1
IT Security Concepts: 1, #1
IT Security Concepts: 1, #1
Ebook125 pages1 hour

IT Security Concepts: 1, #1

Rating: 5 out of 5 stars

5/5

()

Read preview

About this ebook

This Book is best suitable for the any IT proffesional who want to learn some basic concepts of the IT security.

the many security professionals who daily work to ensure the safety of our nation’s critical infrastructures. We want to recognize the thousands of dedicated individuals who strive to protect our national assets but who seldom receive praise and often are only noticed when an incident occurs. To you, we say thank you for a job well done!

LanguageEnglish
Release dateDec 7, 2016
ISBN9781540147820
IT Security Concepts: 1, #1
Author

Ravikumar Patel

Ravikumar Patel is a world-champion winner of everything, a multibillion-dollar startup entrepreneur, an electrical & computer engineer. He is also wrote IT security concepts & What we have to what we Don’t have. He is currently doing research in the IT security field. He has two MNC’s. he is the great motivation speaker.

Read more from Ravikumar Patel

Related to IT Security Concepts

Titles in the series (100)

View More

Related ebooks

Security For You

View More

Related articles

Reviews for IT Security Concepts

Rating: 5 out of 5 stars
5/5

2 ratings1 review

What did you think?

Tap to rate

Review must be at least 10 words

  • Rating: 5 out of 5 stars
    5/5
    best engineering book for understanding the IT security concepts. i'll recommend to everyone.
    thanks a lot.

Book preview

IT Security Concepts - Ravikumar Patel

DEDICATION

––––––––

This book is dedicated my parents and my lovely wife and to the many security professionals who daily work to ensure the safety of our nation’s critical infrastructures. We want to recognize the thousands of dedicated individuals who strive to protect our national assets but who seldom receive praise and often are only noticed when an incident occurs. To you, we say thank you for a job well done!

ABOUT THIS BOOK

Important Technology Skills

––––––––

Information technology (IT) offers many career paths and information security is one of the fastest-growing tracks for IT professionals. This book provides coverage of the materials you need to begin your exploration of information security. In addition to covering all of the CompTIA Security+ exam objectives, additional material is included to help you build a solid introductory knowledge of information security.

Table of Contents

––––––––

Chapter 1: Information privacy and security

Chapter 2: Identification & authentication

Chapter 3: Software program security

Chapter 4: Malicious code

Chapter 5: Interception and Access

Chapter 6: Encryption

Chapter 1

Information privacy and security

I wanted to pose an interesting philosophical question namely why is information security necessary.

PC security, otherwise called digital security or IT security is the assurance of PC frameworks from the robbery or harm to the equipment, programming or the data on them, and also from disturbance or confusion of the administrations they give.

––––––––

Although many of the Investments that are made into information privacy and security are not related to malicious attacks. There is nevertheless an extraordinarily large amount of investment in information privacy and security mechanisms that are targeted toward protecting systems against attacks by malicious parties from a philosophical perspective.

––––––––

Image result for information security

––––––––

It's important to consider what this says about Trinity on the one hand it shows that we are certainly curious creatures but on the other hand. It shows that we as a species are not particularly trustworthy and we're all so greedy there are many people in the organizations of the Toronto and even governments in the world that would be very happy to steal personal private information from you or your organization for their own gain.

This appears to be a natural trait of human beings in virtually all cultures and it's important to note that if we were not like this as the quantity of time money and other resources that individuals organizations and government must invest into protecting their information assets would be much less than I was today with those philosophical thoughts.

Information security is characterized by interactions with technology computational capabilities are being embedded in a rapidly increasing number and variety of products anything from athletic house to kitchen appliances to implantable medical devices and what does it means is that with every passing day computers are controlling and administering and making decisions about more and more aspects of Our Lives. What we can conclude from the situation is that we are becoming more and more dependent on these information. and community colleges every single day and this situation has very important implications with respect to our privacy and security to better understand why consider the relationship between our two islands on technology and risk. because we live in a world where we are increasingly entrusting our wives and our livelihoods to computer Technologies and because those Technologies are not entirely Dependable safe or secure our increasing Reliance on these information and communication Technologies brings with it a great deal of new risks.

Related image

––––––––

That were not present prior to the rise of the information age as a disciplined mind as a profession then one of the major goals of Information Security is to find ways of mitigating these risks that is to allow us to have our cake and eat it too. Although many people of the world of information privacy and security has one characterized Find hacker’s cyber terrorists or government-sponsored information. as well in reality the scope of information privacy and security is much broader turn around one way of understanding the breadth of the scope is to consider information security from the perspective of it failures our modern Information Technology fail for many different reasons first considered physical failures. These are Hardware devices turn on Hardware can and does fail even in the modern era many of our traditional Technologies still rely on moving parts and a failure of any of these moving Parts in Cascade to cause a wide array of the information technology. As a whole other electronic components can fail and when these components failed permanently the cause of the problem is much easier to diagnose than when they fail intermittently.

––––––––

Image result for information security

––––––––

It is therefore important for managers and system administrators not only to expect that their physical it devices will fail but also to develop plans for how to address those failures. When they inevitably occur beyond physical failures we have other types of Information Technology failures as well and bees can best be understood by considering the intersection of two different dimensions. a long one to mention we have a spectrum which ranges from malicious two non-malicious that is the source of the failure is caused intentionally or unintentionally. and along the other dimension we have a spectrum which ranges from harmless to catastrophic putting these two Dimensions against each other provides us with a geometric space in which we can easily classify our non-physical Information Technology failures a failure than my own non-malicious and harmless it might be non-religious but catastrophic it might be malicious.

But caused no harm or the worst scenario it may be a malicious attack. That cause’s catastrophic damage to our information a smile again remember that information security has a broad scope. And information security addresses each of these different types of failures what's more information security throughout failures. that have never before been seen or do not currently exist and that statement speaks to the dynamism and constant change that characterizes the world of information security so when thinking about information security remember that it has a vast scope we're talking here about protecting anything from tiny little room to graded circuits. All the way up massive clusters of servers that may involve thousands of unique machines were talking about protecting a local private Network that you may have in your home or your apartment all the way up to massive wide area networks or even the entire internet were talking about protecting Hardware, software, operating systems, databases, networks etc.

The scope of inquiry in computer security is vast continuously changing and ever-growing broadly speaking however computer security as being concerned Toronto protecting information assets and when we say information assets are over referring to is elements of the information system. that have value since value lies at the core of our focus our information security efforts a critical first step is identifying what within our organization has value and to, whom do those items. Information Technology assets is to subdivide assets into three categories.

First we have Hardware assets and these Kenwood Computing systems mobile devices networks and Communications channels. And we have software assets these can include operating systems off the shelf application programs mobile apps as well as custom or customized application programs. Finally we have data assets these are our files are databases the information that we generate in our daily lives or in carrying out our house. And as we will see it is often this class of assets that has the greatest value of all when considering this diagram.

Remember that the perceived value of an atom depends in part upon the ease with which that can be replaced certain components of an information system. Turn on the Jets Hardware mobile devices operating systems off-the-shelf software can be easily replaced by contrast custom applications or mobile apps and our data are often unique and irreplaceable. perhaps you can think of an example to our own your own life where

Enjoying the preview?
Page 1 of 1