columns

Network security

Written by Engineer Ismail BabikerI
Networks mean a specific system for connecting two or more computers using communications technology with the aim of exchanging available information and data between more than one party, as well as with the aim of sharing available resources such as printers and application programs. These networks also allow direct communication between members of the network community for the purpose of knowing the exchange of information.
Definition of information network security
It is a set of procedures that can provide maximum protection for information and data in networks from all risks that threaten them, by providing the necessary tools and means to protect information from internal or external risks.
Components of information network security
First: confidentiality of information
This aspect includes the necessary procedures and measures to prevent unauthorized persons from accessing information to which the confidentiality clause or sensitive information applies. This is what is meant by the security and confidentiality of information. Of course, the degree of this confidentiality and the type of information varies from one institution to another according to the policy followed in the institution itself. Examples of this information include: Must be confidential: Personal information of individuals.
Second: Integrity of information
In this aspect, the greatest concern is not to maintain the confidentiality of the information, but rather to maintain the integrity of this information from forgery and change after announcing it publicly. A body may announce financial or other information related to the body, and here comes the role of maintaining safety by having this information protected. From change or forgery. Examples of this include, for example: ministries or universities announcing the names of those accepted to work there. The protection of these lists is to ensure that they are insured against change and forgery by deleting names and adding other names, which causes embarrassment and legal problems for institutions, and also with regard to financial information by changing a financial amount from 100 to 1,000,000, and this is very important because of the huge losses of money it causes.
Third: Ensuring access to information
Perhaps it is logical to know that all information procedures and industries basically aim for one goal, which is to deliver information and data to the right people at the right time. Therefore, preserving the confidentiality of information and ensuring its integrity and immutability does not mean anything if authorized or authorized persons cannot access it. To it, and here comes the importance of the third aspect or components of information security, which is ensuring that information reaches the people authorized to access it by providing safe and quick channels and means to obtain that information. In this aspect, saboteurs work in various ways to deprive and prevent beneficiaries from accessing information, such as Deleting information before accessing it, or even attacking information storage devices and destroying them, or at least sabotaging them.
Motives for attacks on information networks
A question may come to mind: Why do vandals or hackers carry out operations such as penetrating information networks and threatening information security? What motives could they have for carrying out such actions? Every person must have motivations to do work
Obtaining documents, photos or important files and bargaining with their owner for a fee paid to the hacker.
Stealing money and bank accounts directly by seizing their confidential data
Identity theft with the aim of obtaining bank loans or completing financial transactions in the name of the victim
Theft of property or cars by seizing personal data related to the location of that property and its registration data
Stealing addresses, phone numbers, and email addresses of friends and acquaintances with the aim of targeting them with advertising campaigns.

Back to top button