logo

Analysis of Information Security.

   

Added on  2022-09-05

13 Pages622 Words27 Views
Analysis of information
securityAnalysis of information
security

Information securityInformation securityIt refers to procedures and policies for
ensuring security and privacy of
information from illegal access.
It refers to procedures and policies for
ensuring security and privacy of
information from illegal access.

Information security exampleInformation security exampleWhen authentication is applied for
system that stores data, it does not
allows anyone to access data if they do
not have required permission to access
data as well.
When authentication is applied for
system that stores data, it does not
allows anyone to access data if they do
not have required permission to access
data as well.

Cyber securityCyber securityIt refers to process to secure network,
hardware, electronic system and data
from illegal access or techniques that
exploits security of a system as well.
It refers to process to secure network,
hardware, electronic system and data
from illegal access or techniques that
exploits security of a system as well.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Contemporary issues in information technology Assignment 2022
|11
|3434
|56

Cyber Security: Response to Discussions on Cyber Terrorism, Malicious Programs, Hacking Detection and Choice Theory
|5
|733
|138

Cyber terrorism and Cyber warfare
|15
|4802
|116

How Serious Are Cyber Security Attacks
|13
|3593
|224

Cyber Security Threat Management | Assignment
|9
|2180
|85

The Impacts of Cyberterrorism
|3
|517
|394