Vhuiplnnv 88
Vhuiplnnv 88
For example, in 2017, a major data breach occurred at Equifax, a large credit reporting
agency. Over 140 million people's personal information, including Social Security numbers,
was exposed. This breach showed how important it is to have strong information security
measures.
Challenges include insider threats (employees who misuse data) and natural disasters that
affect data availability. Maintaining all three aspects of the CIA triad is crucial for any
organization.
3. Types of Threats
Organizations face many types of security threats, including:
- Malware: Malicious software that harms or disrupts systems. Examples include viruses,
worms, and ransomware. In 2017, the WannaCry ransomware attack affected organizations
worldwide by locking computers and demanding payment.
- Phishing: A type of social engineering attack where attackers send fake emails to trick
users into giving personal information like passwords or credit card numbers. For example,
a hacker might send an email that looks like it's from a bank.
- Insider Threats: Sometimes, employees or trusted individuals misuse their access to
sensitive information. This can be intentional or accidental. For example, a disgruntled
employee may leak confidential company data.
- Denial of Service (DoS): In these attacks, hackers flood a network with traffic, making it
unavailable to users. An example is when attackers overload a company’s website, causing it
to crash.
Organizations use various tools and strategies to protect against these threats, such as
firewalls, employee training, and regular software updates.
Procedures are detailed instructions on how to implement these policies. For example, a
procedure might describe how to report a security incident. Regular employee training
helps ensure everyone understands and follows these policies, reducing the risk of security
breaches.
Authorization happens after authentication and determines what resources a person can
access. For example, an employee may have access to certain files, but not all files on the
company's network. This prevents unauthorized people from accessing sensitive data.
6. Encryption Basics
Encryption is a way to protect data by transforming it into a code that can only be read by
authorized people with a decryption key. This ensures that even if data is intercepted, it
cannot be understood. For example, when you send an email, encryption can make sure that
only the person you send it to can read it.
Physical security also involves ensuring that equipment is not damaged by natural
disasters, such as floods or fires, and that backups are stored in safe locations.
8. Security Tools
Various tools are used to protect information:
- Firewalls: Firewalls block unauthorized traffic from entering or leaving a network. They
act as a barrier between the trusted internal network and untrusted external networks.
- Antivirus Software: This scans for and removes malicious software from computers and
systems. It helps prevent malware infections.
- Intrusion Detection Systems (IDS): IDS tools monitor networks for suspicious activity. If
something unusual is detected, the system sends alerts so that immediate action can be
taken.
Following these best practices can significantly reduce the risk of data breaches and help
protect sensitive information.