C06.Information_Security_printable

C06.Information_Security_printable - Information security...

Info iconThis preview shows pages 1–6. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Information security refers to the protection of information systems and the information they manage against unauthorized access, use, manipulation, or destruction, and against the denial of service to authorized users. Information Security • Machine-Level Security • Network Security • Internet Security Concepts > Information Security In this section: Machine-level security refers to actions taken to protect information on a computer that may or may not be connected to a computer network or the Internet. Machine-Level Security • Authentication • Encryption • Data Backup Concepts > Information Security > Machine-Level Security In this section: Authentication is a security process in which the identity of a person is verified. Authentication Facial pattern recognition is a form of biometrics that uses a mathematical technique to measure the distances between points on the face. Concepts > Information Security > Machine-Level Security > Authentication Form of Authentication Description Something you know Information such as a password or personal identification number (PIN) Something you have An item such as an ID card, smart card, badge, keychain fob, and other items designed to be used to authorize access to secure areas and systems Something about you Unique physical characteristics such as fingerprints, retinal patterns, and facial features that can be scanned and used for authentication Encryption Encryption is a security technique that uses high- level mathematical functions and computer algorithms to encode data so that it is unintelligible to all but the intended recipient. Concepts > Information Security > Machine-Level Security > Encryption Data Backup Data backup is a process in which copies of important computer files are stored in a safe place to guard against data loss. Concepts > Information Security > Machine-Level Security > Data Backup With the advent of cloud computing, users are storing increasing amounts of data on Internet servers. E-mail, calendars, documents, photos, and other data are being saved in services provided by Google, Yahoo!, Microsoft, Flickr, Facebook, and other Web 2.0 applications. applications....
View Full Document

This note was uploaded on 09/27/2011 for the course BCIS 1301 taught by Professor Connor during the Spring '11 term at Lone Star College System.

Page1 / 25

C06.Information_Security_printable - Information security...

This preview shows document pages 1 - 6. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online