Discuz! Board

 找回密碼
 立即註冊
搜索
熱搜: 活動 交友 discuz
查看: 4|回復: 0

What is information security and how does business implement it?

[複製鏈接]

1

主題

1

帖子

5

積分

新手上路

Rank: 1

積分
5
發表於 6 天前 | 顯示全部樓層 |閱讀模式

It is unlikely that one article can cover all aspects of information security. Therefore, today we will answer key questions about information security: what is it, why is it needed and how is it implemented in practice.

Let's say you own an online store. Even if it's small, you still work with sensitive information. For example, you store documents from the finance or accounting department, a customer base, and possibly employee data. All of this needs to be carefully protected. This is what the information security department does.

What is information security
When business was entirely "paper", companies hid all valuable data in safes and hiding places. With wordpress web design agency the development of technology, business began to transfer information into "digital" and protect it not only by physical means, but also by virtual ones.

dreamstime_xxl_194037_1.png
Let's look at an example. A company that processes personal data of employees and clients rents Cloud 152-FZ specifically for hosting the ISPDN. The legislation allows storing PDn in provider cloud services if the infrastructure on which it is built meets the requirements of regulators.




The set of physical and information security measures for such a cloud fully complies with the requirements of Roskomnadzor, FSTEC and the FSB. It is impossible to get into the data center, and even more so, to the server itself, without a pass and the appropriate level of access. Information security tools are used for protection at the "virtual" level: firewalls, intrusion detection tools, cryptographic tools, antivirus, encryption tools and much more.

What does information security provide?
Information security is responsible for compliance with three principles: confidentiality, integrity and availability of information.

Confidentiality ensures that only authorized persons have access to data — that is, those who have the right to do so. For example, only you know the login details for your Telegram account or any other messenger. If the password falls into the hands of an intruder, the confidentiality of the information will be violated.


回復

使用道具 舉報

您需要登錄後才可以回帖 登錄 | 立即註冊

本版積分規則

Archiver|手機版|自動贊助|

GMT+8, 06:47 , Processed in 0.262151 second(s), 18 queries .

抗攻擊 by GameHost X3.4

Copyright © 2001-2021, Tencent Cloud.

快速回復 返回頂部 返回列表
一粒米 | 中興米 | 論壇美工 | 設計 抗ddos | 天堂私服 | ddos | ddos | 防ddos | 防禦ddos | 防ddos主機 | 天堂美工 | 設計 防ddos主機 | 抗ddos主機 | 抗ddos | 抗ddos主機 | 抗攻擊論壇 | 天堂自動贊助 | 免費論壇 | 天堂私服 | 天堂123 | 台南清潔 | 天堂 | 天堂私服 | 免費論壇申請 | 抗ddos | 虛擬主機 | 實體主機 | vps | 網域註冊 | 抗攻擊遊戲主機 | ddos |