Information Security
Information Security
Physical security controls are designed to prevent unauthorized personnel from gaining
physical access to network components such as routers, cabling cupboards and so on.
Controlled access, such as locks, biometric authentication and other devices, is
essential in any organization.
Technical security controls protect data that is stored on the network or which is in
transit across, into or out of the network. Protection is twofold; it needs to protect data
and systems from unauthorized personnel, and it also needs to protect against
malicious activities from employees.
Administrative security controls consist of security policies and processes that control
user behavior, including how users are authenticated, their level of access and also how
IT staff members implement changes to the infrastructure.
Q;NO;2
Database Security
Database security refers to the range of tools, controls, and measures designed to establish and
preserve database confidentiality, integrity, and availability. Database security must address
and protect the following: The data in the database. The database management system
(DBMS).
DBMS configuration
It is critical that the DBMS be properly configured and hardened to take advantage of
security features and limit privileged access that may cause a misconfiguration of
expected security settings. Monitoring the DBMS configuration and ensuring proper
change control processes helps ensure that the configuration stays consistent.
Authentication
Database security measures include authentication, the process of verifying if a user’s
credentials match those stored in your database, and permitting only authenticated
users access to your data, networks, and database platform.
Q;NO;3
Hardware security
Hardware security is vulnerability protection that comes in the form of a physical device rather
than software that is installed on the hardware of a computer system. Hardware security can
pertain to a device used to scan a system or monitor network traffic. Common examples
include hardware firewalls and proxy servers.
Types;
Advanced malware protection software. ...
Application security software. ...
Firewall software. ...
Endpoint security software. ...
Web security software. ...
Network security software.
Q;NO;5
Information security;
Information Security is basically the practice of preventing unauthorized access, use, disclosure,
disruption, modification, inspection, recording or destruction of information. Confidentiality
means information is not disclosed to unauthorized individuals, entities and process.
Principle
The fundamental principles (tenets) of information security are confidentiality, integrity,
and availability. Every element of an information security program (and every
security control put in place by an entity) should be designed to achieve one or more of these
principles.
Types
Application security. Application security is a broad topic that covers software
vulnerabilities in web and mobile applications and application programming
interfaces (APIs). ...
Cloud security. ...
Cryptography. ...
Infrastructure security. ...
Incident response. ...
Vulnerability management