LECTURE ON SECURING SYSTEM INFORMATION @steeming community||10% payout by @jerryivan

in hive-139293 •  3 years ago 

images (18).jpeg
source

Hello my fellow steemians, how are you people all doing. I know you are doing great today.
Welcome to my blog today as I share with you on the basis of securing you information system.

First of all, we will know what we mean by the word security.

What is Security?

Therefore, Security is on a general perspective defined as the quality or state of being secured that is being free from danger.
Security can also be defined as the protection against adversaries and from those that will do harm intentionally or do otherwise.

We tend to secure our information so that it cannot be hacked or stolen for our own good. That is why most times when we are asked to enter a password, it requires a stronger password that no unauthorized personnel can assess it.

Information system security

Information system security is defined as the protection of information and it's critical elements including the system and hardware that uses, store and transmit information. Information security protects the confidentiality, availability and integrity of an information assess whether in storage, processing or in transmission.

It is achieved via the application of policies, education, training awareness and technology. The information system security is based on three characteristics of information that gives value to an individual or any organization. They include

A. CONFIDENTIALITY:-
Information has confidentiality when it is protected from disclosure or exposure from another system. To protect the confidentiality there are measures you need to take. They are,

  • Information classification:- For your information to be confidential It must be classified.

  • Security document storage:- This is the process of knowing where the information Is stored.

  • Application of general security policy:- This is the process of apply the existing policies in securing your information from unauthorized users.

  • Education of information custodians or end users:-. This is the process of educating other persons on how to keep their information confidential to avoid unnecessary assess to their information system.

B. INTEGRITY:-
Information is said to have integrity when the information is whole, complete and incorrupted. The integrity of information is threatened when the information is exposed or disclosed to corruption, damage, destruction and other distruption of it's authentic state.

Corruption can occur while information is being stored or transmitted.

C. AVAILABILITY:-
It enables authorized users (person and computer system) to assess information without interference or obstruction and also to receive it in the required format.

This three major characteristics must be applied to an information in securing it for better purposes in future

Thanks for reading, I appreciate.
We will see in my next post on risk Management.

To the attention of
@steemingcuration
@iddy
@psicoparedes
@imamalkimas
@eberechi10
@starrchris
@vectorshore

Authors get paid when people like you upvote their post.
If you enjoyed what you read here, create your account today and start earning FREE STEEM!
Sort Order:  

Thank you for sharing this important information on securing system information. For information to be confidential,it must be classified and stored in a safe place. Well done.

Thanks @iddy, I appreciate

You are welcome

!zen 20

Helloo, It is Alejandro. I just pass by to tell you that I have curated your post using Steemingcuration account. Keep up with the good work 😊

Notes: none.

the post has been upvoted successfully! Remaining bandwidth: 180%

Thanks @psicoparedes, I appreciate your wonderful works and support to me.

Safeguarding information is important, depending on the methods we use to protect our information we can guarantee more or less information. Although there is nothing 100% reliable on the Internet, and therefore all possible precautions should be taken.

Happy day @jerryivan.

#affable #venezuela