Week 1..
This is our first class. Inside this class, Encik Zaki have explained Introduction to Information Security.
Before he keeps on lesson, he gave us quiz 1. The quiz question quite difficult to answer, because it uses crossword..The quizzes more to what we understand about network security.
Ok, now i'll continue back what have Encik Zaki explained to us.
In this modul will be covered 14 lectures:
*Introduction to Information Security
*Introduction to Cryptography
*Modern Cryptography
*Access Control and Authentication
*Program Security
*Database Security
*Security in Networks
*Security in Applications
*Firewall
*Intrusion Detection System
*Wireless Security
*Legal and Ethical Issues in Computer Security
*Cyberlaws
*Administering Security
Why we computer security??
* It's because an information security specialist is more than a technician who prevents hackers from attacking a Web site.
* BUT, we need to understand about cryptography and firewall which these tools used by specialists to protect information systems.
Continue chapter 1..
In this chapter have a sub topic
*What is security?
-Security, for a computing system, means that the information on the system is protected from unauthorized disclosure
-In information technology, security is the protection of information assets through the use of technology, processes, and training.
There are many ways in which the security of a computer system can be violated. Unauthorized access to read or write files can be the result of
-the abuse of privileges by users or administrators
-malicious programs that surreptitiously gain privileges or access to files
-idle browsing of files that are inadequately protected by existing security mechanisms
*Security Architecture
*Security Principles
*Security Policy
*Security Attacks / Threats
*Methods of Defense
*Security Services
*Security Mechanisms
The content covered are all important. I am having knowledge about most of these topics but few of them are unique and I am curious to learn about them. In this digital age there is a high need for information security and a number of tools are available to protect information.
ReplyDeletedigital signature Microsoft