deniseangelaaa-blog
Untitled
3 posts
Don't wanna be here? Send us removal request.
deniseangelaaa-blog · 8 years ago
Photo
Tumblr media
Inasec Final Blog
As the semester of studying Information Assurance and Security is coming to an end. This journey teach me many things that can help me in the future as an IT student.
The things I learned in this course is how to secure your valuable informations or datas to avoid intruders attacks. 
There are lots of solutions on how to secure our informations and important datas. For example is IDPS. IDPS stands for  Intrusion Detection Prevention System wherein  it can detect a violation of its configuration and active alarm. Meaning it can help you whenever someone is hacking your informations. We use IDPS to prevent problem behaviors by increasing the perceived risk of discovery and punishment also to detect attacks and other security violations. It also provides useful information about intrusions that take place. 
Another solution for securing our data is by cryptography. Cryptography is a  process of making and using codes to secure transmission of information.  Cryptology is the science of encryption; combines cryptography and crypt analysis.  Cryptanalysis is the process of obtaining original message from encrypted message without knowing algorithms
Encryption is converting original message into a form unreadable by unauthorized individuals. Decryption is the process of converting the ciphertext message back into plaintext Principles.  Cryptography has many advantages first one is it  increased security and convenience: private keys never need to be transmitted or revealed to anyone. Another one is  they can provide digital signatures that cannot be repudiated.  I enjoyed decoding some but it also give me headaches.
And also while we are discussing this things i learned that  firewall acts as the demarcation point or “traffic cop” in the network, as all communication should flow through it and it is where traffic is granted or rejected access. Firewalls enforce access controls through a positive control model, which states that only traffic defined in the firewall policy is allowed onto the network; all other traffic is denied.
And I must say that studying information security is enjoyable but hard. Discussing those things give me a roller coaster ride. It’s hard yes, but the thing is i learned something that can help me in my future job as an IT.   
0 notes
deniseangelaaa-blog · 8 years ago
Photo
Tumblr media
What is a Computer Virus?
-A computer virus  is a type of malicious software program ("malware") that, when executed, replicates by reproducing itself (copying its own source code) or infecting other computer programs by modifying them.
Trojan Horse Virus
- A Trojan horse or Trojan is a type of malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users' systems
Worm Virus
-Worm Virus is a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it.
Viruses can cause many problems on your computer. Usually, they display pop-up ads on your desktop or steal your information. Some of the more nasty ones can even crash your computer or delete your files. -Your computer gets slowed down -Some the applications won't start(ex: I hate mozilla virus won't let you start the mozilla) -You can not see some of the settings in your OS
0 notes
deniseangelaaa-blog · 8 years ago
Photo
Tumblr media
          Information security is the state of being protected against the unauthorized use of information, especially electronic data.
           In everyday life we take steps for us to protect things that are important to us. For example when we go out we always lock our doors, we put our important valuables somewhere safe. The reasons why we do this is to protect our properties or valuables from someone we don’t trust because we don’t want them to get a hold of it, because we don’t want our properties and valuables to come to any harm.
           There are many things that we want to protect for example some medical records financial records, messages, e-mails, passwords, credit card numbers and bank informations, and this is where information security takes place. Information security helps us to protect the informations I mentioned above.
           The information security performs four important functions for an organization which is enables the safe operation of application implemented on the organization’s Information Technology (IT) systems, protect the data the organizations collects and use, safeguards the technology assets in use at the organization and lastly is protect the organization’s ability to function. Information security will protect the data the organization collects and used. If the information is left unprotected, the information can be accessed by anyone. If the information falls into the wrong hands, it can destroy lives, dropping business and can also be used to do harm.
           As an IT student, Information Security is important to us because we can use this in our work in the near future for example when we are in a company we can help them protect some of their confidential informations.
0 notes