IT Security

IT Security

IT Security

Information Security intervenes to protect computer systems against data breaches. The main modes of data protection is the protection of confidentiality, availability and integrity.

Protection from cyber attacks acts at various levels: first of all, logistically, by locating the server in safe places, provided surveillance and access control; In addition to logic level through the authorization and authentication of an entity that represents the user in the system. Then after authentication, each operation performed by the user is plotted in log files., with a monitoring action told audit or accountability.

Types of security and Attacks

In terms of computer security is often made the distinction between passive and active safety.

Passive safety

Passive safetyConcept of passive safety covers all those defensive tools whose purpose is to prevent unauthorized individuals from accessing information, data, resources, systems and installations reserved. Therefore can be considered passive safety components also equipment such as doors or access systems using personal identification.

Active safety

Active safetyActive safety instead develops tools and systems that make it inherently confidential data safe, protecting them from the possibility that an unauthorized user accesses it or override them, then violating the confidentiality and integrity.

It’s obvious that these two aspects of security are complementary.

Given the many and varied attack modes, methods of defense of a system must apply equally, contemplating various barriers between the attacker and the target.

This goal is almost always represented by the data rather than systems, and information security must take care to prevent access to unauthorized users, but also to individuals who have limited permission to determiniate operations, to avoid the risk that the data be deleted, copied or modified.

Types of infringement are many: attempts to gain unauthorized access to restricted areas, appropriation of confidential files or digital identity, use of resources that the user should not normally be able to use etc.. Computer security is also involved in the prevention of potential Denial of Service (DoS) attacks on the system to render unusable some resources bringing harm to those who use the system. To prevent any breach of hardware and software tools are used.

Industrial Safety

Each structure must be able to guarantee the security of their data, in an environment where the risks generated by violations of computer security systems are steadily growing. Company has specific obligations in relation to privacy, including that of produce each year a document on security. At the international level has been also approved the new Standard ISO 27001:2005 for the approval of the rules of data protection and information from threats varioi type, to ensure its confidentiality, integrity, and availability. The standard provides guidance on the requirements of a proper system of management of information security (ISMS) objectified on adequate management of corporate data. A key moment in any planning of safety is given by the evaluation and management of risk.

Main techniques of attack

Buffer Overflow Exploit Hacking Cracking Backdoor Shellcode Port scanning Sniffing Spoofing Trojan Computer Virus DOS DDOS Social Engineering

Main techniques of defense

Virus Anti-Spyware Firewall Encryption Digital Signature Honeypot Intrusion Detection System (IDS), Network Intrusion Detection System (NIDS) Steganography