Information security, sometimes shortened to infosec



Download 0,67 Mb.
Pdf ko'rish
bet21/35
Sana07.08.2021
Hajmi0,67 Mb.
#140828
1   ...   17   18   19   20   21   22   23   24   ...   35
Bog'liq
Information security - Wikipedia

Cryptography
Information security uses cryptography
to transform usable information into a
form that renders it unusable by anyone
other than an authorized user; this
process is called encryption. Information
that has been encrypted (rendered
unusable) can be transformed back into
its original usable form by an authorized



user who possesses the cryptographic
key, through the process of decryption.
Cryptography is used in information
security to protect information from
unauthorized or accidental disclosure
while the information is in transit (either
electronically or physically) and while
information is in storage.
[37]
Cryptography provides information
security with other useful applications as
well, including improved authentication
methods, message digests, digital
signatures, non-repudiation, and
encrypted network communications.
Older, less secure applications such as
Telnet and File Transfer Protocol (FTP)


are slowly being replaced with more
secure applications such as Secure Shell
(SSH) that use encrypted network
communications. Wireless
communications can be encrypted using
protocols such as WPA/WPA2 or the
older (and less secure) WEP. Wired
communications (such as ITU‑T G.hn)
are secured using AES for encryption and
X.1035 for authentication and key
exchange. Software applications such as
GnuPG or PGP can be used to encrypt
data files and email.
Cryptography can introduce security
problems when it is not implemented
correctly. Cryptographic solutions need


to be implemented using industry-
accepted solutions that have undergone
rigorous peer review by independent
experts in cryptography. The length and
strength of the encryption key is also an
important consideration. A key that is
weak or too short will produce weak
encryption. The keys used for encryption
and decryption must be protected with
the same degree of rigor as any other
confidential information. They must be
protected from unauthorized disclosure
and destruction and they must be
available when needed. Public key
infrastructure (PKI) solutions address
many of the problems that surround key
management.
[37]


The terms "reasonable and prudent
person," "due care" and "due diligence"
have been used in the fields of finance,
securities, and law for many years. In
recent years these terms have found
their way into the fields of computing and
information security.
[46]
 U.S. Federal
Sentencing Guidelines now make it
possible to hold corporate officers liable
for failing to exercise due care and due
diligence in the management of their
information systems.
[57]
In the business world, stockholders,
customers, business partners and
Process


governments have the expectation that
corporate officers will run the business in
accordance with accepted business
practices and in compliance with laws
and other regulatory requirements. This
is often described as the "reasonable and
prudent person" rule. A prudent person
takes due care to ensure that everything
necessary is done to operate the
business by sound business principles
and in a legal, ethical manner. A prudent
person is also diligent (mindful, attentive,
ongoing) in their due care of the
business.
In the field of information security,
Harris
[58]
 offers the following definitions


of due care and due diligence:
"Due care are steps that are
taken to show that a company
has taken responsibility for the
activities that take place within
the corporation and has taken
the necessary steps to help
protect the company, its
resources, and employees."
And, [Due diligence are the]
"continual activities that make
sure the protection
mechanisms are continually
maintained and operational."


Attention should be made to two
important points in these definitions.
First, in due care, steps are taken to
show; this means that the steps can be
verified, measured, or even produce
tangible artifacts. Second, in due
diligence, there are continual activities;
this means that people are actually doing
things to monitor and maintain the
protection mechanisms, and these
activities are ongoing.
Organizations have a responsibility with
practicing duty of care when applying
information security. The Duty of Care
Risk Analysis Standard (DoCRA)
[59]
provides principles and practices for


evaluating risk. It considers all parties
that could be affected by those risks.
DoCRA helps evaluate safeguards if they
are appropriate in protecting others from
harm while presenting a reasonable
burden. With increased data breach
litigation, companies must balance
security controls, compliance, and its
mission.

Download 0,67 Mb.

Do'stlaringiz bilan baham:
1   ...   17   18   19   20   21   22   23   24   ...   35




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2025
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish