last posts

Research on information security

an introduction

The great technological progress, the development of various means of communication and communication, the openness of the world to each other, and its reliance on sending various types of data through networks, all of this led to a risk of leakage of this data, and its access to the wrong people, or competitors, and thus became an urgent need to maintain information security.

Research on information security

Information Security

Information security is the complete control of information, in terms of determining who will receive this data, determining the powers to access it, and using a set of techniques in order to ensure that it is not penetrated by any party, and its importance doubles from maintaining privacy, to maintaining important data such as customer accounts in banks.

Internet risks to information security

On the usual Internet, there is a wide range of weaknesses that enable unauthorized people to access this data, including programming errors that programmers make while building networks, or designing various applications, such as errors in how the application deals with wrong input, or due to bad Memory distribution, and there are many programmers who design programs intended to penetrate systems and search for their weaknesses.

Ways to maintain information security

A number of protection methods are used to maintain information security, including:

  • Physical protection methods: There are many simple methods that must be followed in order to maintain information security, which are to keep the computer in a safe place, put a password on it to prevent intruders from tampering, and that the password contains letters, numbers, and symbols; To make it difficult to predict, and change them periodically.
  • Using a firewall: A firewall is a device or application, and it is placed at the server and network filters, each according to its needs.
  • Encryption: There are many protocols designed to encrypt data so that it prevents anyone from understanding it, and the degree of complexity in this encryption varies, there are some systems that can be solved by returning to the rules of their encryption, and therefore a complex method must be adopted, making it as difficult as possible The possibility of returning the text to its language before encryption, Of course, the decryption key is owned by the receiving device.
  • Data Monitoring (Packet Sniffers): There are many applications that are able to know the data traffic coming out and entering the network, and by analyzing it, the intrusions that occurred in this network can be reached, and their location.
The more important and confidential the data, the more means are used to protect it, both physical and software, for example, servers are placed in a place that is protected by various physical methods, including guards.


Font Size
lines height