Today one of the most urgent problems in the field of information systems is the protection of information on the internet. Indeed, people can’t imagine their life without electronic global network. People make a variety of financial transactions on the internet, order goods, services, use credit cards, carry out payments, talk and write, and perform many other actions that require privacy and protection.
Information security is a state of information indicating that the system is operating normally, data is protected, its safety is ensured and there is integrity, confidentiality, and availability. The main components of information security involve the following:
These are the three principles of information security. In addition to them, there is a principle of authenticity, which means the authenticity of the subject and object of access must be ensured.
There are several sources that may pose a threat or unauthorized access to your data on the computer.
There are man-made source that include the actions of different subjects. They may be intentional or unintentional. They are divided into external and internal types. The first is the illegal invasion of a foreign person from the external general-purpose network. The second one involves an act from within, i.e., by an officer of the company, for example.
Everything that leads to a failure or refusal of work of the program or computer refers to man-made sources. Here you can blame software errors, obsolete device or system, and equipment failures (cable or disk system, a server, or workstation problems).
When you pass transfer some data using internet, then before it reaches its destination, it gas to go through many other servers and routers. There is no tracking control on its way. Therefore, anything can happen to this information. Data protection on the internet is one of the main problems of any large company or organization.
In order to ensure the necessary privacy, companies often seek help of experts in cryptography or encryption of information. When you create the encrypted data you use an algorithm or device that implements it. The changing code of key is managed by encryption. With its help you can extract information.
Today one of the most urgent problems in the field of information systems is the protection of information on the internet. Indeed, people can’t imagine their life without electronic global network.