|
It is unlikely that one article can cover all aspects of information security. Therefore, today we will answer key questions about information security: what is it, why is it needed and how is it implemented in practice.
Let's say you own an online store. Even if it's small, you still work with sensitive information. For example, you store documents from the finance or accounting department, a customer base, and possibly employee data. All of this needs to be carefully protected. This is what the information security department does.
What is information security
When business was entirely "paper", companies hid all valuable data in safes and hiding places. With wordpress web design agency the development of technology, business began to transfer information into "digital" and protect it not only by physical means, but also by virtual ones.
dreamstime_xxl_194037_1.png
Let's look at an example. A company that processes personal data of employees and clients rents Cloud 152-FZ specifically for hosting the ISPDN. The legislation allows storing PDn in provider cloud services if the infrastructure on which it is built meets the requirements of regulators.
The set of physical and information security measures for such a cloud fully complies with the requirements of Roskomnadzor, FSTEC and the FSB. It is impossible to get into the data center, and even more so, to the server itself, without a pass and the appropriate level of access. Information security tools are used for protection at the "virtual" level: firewalls, intrusion detection tools, cryptographic tools, antivirus, encryption tools and much more.
What does information security provide?
Information security is responsible for compliance with three principles: confidentiality, integrity and availability of information.
Confidentiality ensures that only authorized persons have access to data — that is, those who have the right to do so. For example, only you know the login details for your Telegram account or any other messenger. If the password falls into the hands of an intruder, the confidentiality of the information will be violated.
|
|