Learning Resource and Development
Amazon cover image
Image from Amazon.com
Image from Coce

Information security.

Contributor(s): Material type: TextTextPublisher: New York : 3G E-Learning, 2020Edition: 2nd editionDescription: xii, 294 pages : color illustrations ; 24 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9781984636782
Subject(s): DDC classification:
  • 005.8 In34
Contents:
Introduction to information security -- Public-key cryptography -- Network security -- Email privacy and security -- Web security -- Legal and ethical issues of securities -- Security threat and attack.
Summary: "In a progressively interconnected environment, information is disclosed to a rising number and wider variety of risks including threats like computer hacking, malicious code, and denial-of-service attacks. These are more common, aspiring and in trends, in order to maintain and updating information security in an enterprise more of a challenge. In the past years, information security has changed to a well-groomed field within the information systems discipline. In general, security is "the quality or state of being secure-to be free from danger. In other words, protection against adversaries-from those who would do harm, intentionally or otherwise-is the objective. Achieving the appropriate level of security for an organization also requires a multifaceted system. The history of information security begins with computer security. The need for computer security-that is, the need to secure physical locations, hardware, and software from threats-arose during World War II when the first main-frames, developed to aid computations for communication code breaking, were put to use. Multiple levels of security have been implemented to protect these mainframes and maintain the integrity of their data. The book starts with information security principles, and public key cryptography is discussed further, a commonly used cryptographic method used to encrypt data is also discussed. Unlike symmetric cryptography, which uses a single key, this type of system is considered asymmetric because it relies on a pair of keys. Network security is also defined as taking action by an organization to secure its computer system. The book also presents the coverage on the legal and ethical issues of securities. It closes with a focus on security threat and attack today, the Internet brings millions of unsecured computer networks into continuous communication with each other. Threats can lead to attacks on computer systems, networks and more. Threats are potentials for vulnerabilities to turn into attacks on computer systems, networks, and more. They can put individuals' computer systems and business computers at risk, so vulnerabilities have to be fixed so that attackers cannot infiltrate the system and cause damage. The security of each computer's stored information is now contingent on the level of security of every other computer to which it is connected. Recent years have seen a growing awareness of the need to improve information security, as well as a realization that information security is important to national defense. Providing you with basic knowledge of information security in both theoretical and practical aspects, this 2ndedition presents state-of-the-art information on current information security perspectives, focusing on both technical and functional issues. Currently information security is critical to all business processes and organizations in order to protect the information. The book provides you with fundamental knowledge of information security in both theoretical and practical aspects." -- Back cover
Tags from this library: No tags from this library for this title. Log in to add tags.
Holdings
Item type Current library Shelving location Call number Copy number Status Date due Barcode
Books Books Main Library Circulation Section CIR 005.8 In34 2020 (Browse shelf(Opens below)) 1-5 Available 026185
Books Books Main Library Circulation Section CIR 005.8 In34 2020 (Browse shelf(Opens below)) 2-5 Available 029828
Books Books Main Library Circulation Section CIR 005.8 In34 2020 (Browse shelf(Opens below)) 3-5 Available 030322
Books Books Main Library Circulation Section CIR 005.8 In34 2020 (Browse shelf(Opens below)) 4-5 Available 030323
Books Books Main Library Circulation Section CIR 005.8 In34 2020 (Browse shelf(Opens below)) 5-5 Available 030859
Browsing Main Library shelves, Shelving location: Circulation Section Close shelf browser (Hides shelf browser)
CIR 005.8 In34 2020 Information security. CIR 005.8 In34 2020 Information security. CIR 005.8 In34 2020 Information security. CIR 005.8 In34 2020 Information security. CIR 005.8 In34 2020 Information security. CIR 005.8 In34i 2017 Information security principles and practices CIR 005.8 J630s 2020 Security controls evaluation, testing, and assessment handbook /

Includes bibliographical references and index.

Introduction to information security -- Public-key cryptography -- Network security -- Email privacy and security -- Web security -- Legal and ethical issues of securities -- Security threat and attack.

"In a progressively interconnected environment, information is disclosed to a rising number and wider variety of risks including threats like computer hacking, malicious code, and denial-of-service attacks. These are more common, aspiring and in trends, in order to maintain and updating information security in an enterprise more of a challenge.
In the past years, information security has changed to a well-groomed field within the information systems discipline. In general, security is "the quality or state of being secure-to be free from danger. In other words, protection against adversaries-from those who would do harm, intentionally or otherwise-is the objective. Achieving the appropriate level of security for an organization also requires a multifaceted system. The history of information security begins with computer security. The need for computer security-that is, the need to secure physical locations, hardware, and software from threats-arose during World War II when the first main-frames, developed to aid computations for communication code breaking, were put to use. Multiple levels of security have been implemented to protect these mainframes and maintain the integrity of their data.
The book starts with information security principles, and public key cryptography is discussed further, a commonly used cryptographic method used to encrypt data is also discussed. Unlike symmetric cryptography, which uses a single key, this type of system is considered asymmetric because it relies on a pair of keys. Network security is also defined as taking action by an organization to secure its computer system.
The book also presents the coverage on the legal and ethical issues of securities. It closes with a focus on security threat and attack today, the Internet brings millions of unsecured computer networks into continuous communication with each other. Threats can lead to attacks on computer systems, networks and more. Threats are potentials for vulnerabilities to turn into attacks on computer systems, networks, and more. They can put individuals' computer systems and business computers at risk, so vulnerabilities have to be fixed so that attackers cannot infiltrate the system and cause damage. The security of each computer's stored information is now contingent on the level of security of every other computer to which it is connected. Recent years have seen a growing awareness of the need to improve information security, as well as a realization that information security is important to national defense.
Providing you with basic knowledge of information security in both theoretical and practical aspects, this 2ndedition presents state-of-the-art information on current information security perspectives, focusing on both technical and functional issues. Currently information security is critical to all business processes and organizations in order to protect the information. The book provides you with fundamental knowledge of information security in both theoretical and practical aspects." -- Back cover

There are no comments on this title.

to post a comment.