Security Override By Ruvesh Shaikh(RV)

Security Override - Security and Hacking tricks.

Advertisement

Breaking

Amazon Fire Stick Free

Friday, April 14, 2017

What is security?

Firstly we should have to know what is security, and its types.


What is security?

Security, in information technology (IT), is the defense of digital information and IT assets against internal and external, malicious and accidental threats. 
This defense includes detection, prevention and response to threats through the use of Security policy, software tools and IT services.

Physical Security.
Physical security is the protection of personnel, hardware, software, networks and data from physical actions, intrusions and other events that could damage an organization. This includes natural disasters, fire, theft and terrorism, among others.

  Information Security.

Information security, also called "infosec" encompasses a broad set of strategies for managing the process, tools and policies that aim to prevent, detect and respond to threats to both digital and nondigital information assests. Infosec includes several specialized categories, including:

  1. Application Security:- The protection of applications from threats that seek to manipulate application and access, steal, modify or delete data. These protections use software, hardware and policies, and are sometimes called countermeasures. Common countermeasures include application firewalls, encryption programs, patch management and biometric authentication systems.                       
  2. Cloud Security:-The set of policies and technologies designed to protect data and infrastructure involved in a cloud computing environment. The top concerns that cloud security looks to address are identity and access management, and data privacy.                                                                          
  3. Endpoint Security:- The part of network security that requires network devices nodes to meet certain security standards before they can connect to a secure network. Nodes devices include PCs, laptops, smartphones and tablets. Endpoint security also extends to equipment like point-of-sale (POS) terminals, bar code readers and IoT devices.                                                                                   
  4. Internet Security:-The protection of software applications, web browsers and virtual private networks (VPNs) that use the internet. Using techniques such as encryption and internet security aim to defend the transfer of data from attacks like malware and phishing as well as denial-of-service (DoS) attacks.                                                                                                                                       
  5. Mobile Security:-The protection of portable devices, such as smartphones, tablets and laptops. Mobile security, also known as wireless security, secures the devices and the networks they connect to in order to prevent theft, data leakage and malware attacks.                                                              
  6. Network Security:-The protection of a network infrastructure and the devices connected to it through technologies, policies and practices. Network security defends against threats such as unauthorized access, and malicious use and modifications.
These video is a collection of sentences, which help you to build up your "SECURITY" knowledge as well as "HACKING".It is basics of all.

Awareness+Protection= Security

No comments:

Post a Comment