!!!Selamat Datang Ke Laman Blog buzz-networksecurity!!!.
WELCOME TO MY BLOG

Tuesday, July 21, 2009

Week 1: Introduction to Information Security

Week 1..

This is our first class. Inside this class, Encik Zaki have explained Introduction to Information Security.

Before he keeps on lesson, he gave us quiz 1. The quiz question quite difficult to answer, because it uses crossword..The quizzes more to what we understand about network security.

Ok, now i'll continue back what have Encik Zaki explained  to us.

In this modul will be covered 14 lectures:

*Introduction to Information Security
*Introduction to Cryptography
*Modern Cryptography
*Access Control and Authentication
*Program Security
*Database Security
*Security in Networks
*Security in Applications
*Firewall
*Intrusion Detection System
*Wireless Security
*Legal and Ethical Issues in Computer Security
*Cyberlaws
*Administering Security

Why we computer security??

* It's because an information security specialist is more than a technician who prevents hackers      from attacking a Web site.

* BUT, we need to understand about cryptography and firewall which these tools used by                specialists  to protect information systems.

Continue chapter 1..

In this chapter have a sub topic

*What is security?

-Security, for a computing system, means that the information on the system is protected from     unauthorized disclosure

-In information technology, security is the protection of information assets through the use of         technology, processes, and training.

There are many ways in which the security of a computer system can be violated. Unauthorized access to read or write files can be the result of 


-the abuse of privileges by users or administrators 

-malicious programs that surreptitiously gain privileges or access to files 

-idle browsing of files that are inadequately protected by existing security mechanisms


*Security Architecture
*Security Principles
*Security Policy
*Security Attacks / Threats
*Methods of Defense
*Security Services
*Security Mechanisms



  




1 comment:

  1. The content covered are all important. I am having knowledge about most of these topics but few of them are unique and I am curious to learn about them. In this digital age there is a high need for information security and a number of tools are available to protect information.
    digital signature Microsoft

    ReplyDelete

 

blogger BUZZ templates | Make Money Online