Posts

Showing posts from October, 2023

Network an introduction

Image
IN THIS ARTICLE (a) What is Network? (b) Types of Network (c) What is Network Connection? (d) Types of Network Connections (e) What is Network Protocol? (f) What is Network Packets? (g) What is Network Topology? (h) Types of Network Topology A Network is a group of  two or more interconnected devices for information or resource sharing and communication. The interconnected devices can be laptop, PC, server, router, switches, printer, smart phone and tablet etc. Types of Network (A) LAN (Local Area Network): It is used to cover a limited or small area like home, office and campus. (B) MAN ( Metropolitan Area Network): It covers a single geographical area and within that area connects different LANs from different locations like a city or large campus. (C) WAN (Wide Area Network): It is used to cover larger geographical area and connects different LANs from different locations like cities, regions and countries. For example: Internet Connections In networking, " connections "

Key differences between Information Security and Cyber Security

Information security has a more comprehensive scope that covers both physical and digital aspects of information protection while Cybersecurity is a specialized subset that focuses solely on digital data and assets in the context of online threats. Both are crucial elements of a company's overall security strategy, working together to reduce potential threats and provide all-encompassing security. Key differences between the two areas are as below: 1. Protection Boundaries Information security covers a wider range of issues pertaining to protecting all forms of sensitive information. This comprises intellectual property, physical documents, digital data, and staff expertise. No matter the medium in which the information is stored (physical or digital), information security attempts to safeguard its availability, confidentiality, and integrity while Cyber security a  subcategory of information security, is concerned with precisely defending digital assets and information against onl

Cyber Security

" Threat  is potential cause of an unwanted incident, which may result in harm to a system or organization"  (ISO IEC 27000 : 2017 Clause 2.83) " Attack  is an attempt to destroy, expose, alter, disable, steal or gain unauthorized access to or make unauthorized use of an asset "  (ISO IEC 27000 : 2017 Clause 2.3) The Cyber Security is a multidisciplinary field. The primary objective of cybersecurity is to defend digital systems, networks, and data against threats, vulnerabilities, and attacks. It is essential in today's interconnected world, where reliance on technology and the internet has made people, organizations, and governments vulnerable to a number of cyberthreats. Cyberthreats: These are criminals or hacker-initiated online behaviors or acts that target weaknesses in computer networks, systems, and data. Malware (such as viruses and ransomware), phishing scams, denial-of-service (DoS) attacks, data breaches, and insider threats are examples of common c

Information Security

" Information is meaningful and useful data which can be processed, refined, analyzed, structured, relevant to the criteria, verifiable and documented as needed" "Information is an asset , has value for any organization like other important assets."  " Information System  can be applications, services, information technology assets, or other information handling components"  (ISO IEC 27000 : 2017 Clause 2.39) " Threat is potential cause of an unwanted incident, which may result in harm to a system or organization"  (ISO IEC 27000 : 2017 Clause 2.83) " Attack  is an attempt to destroy, expose, alter, disable, steal or gain unauthorized access to or make unauthorized use of an asset "  (ISO IEC 27000 : 2017 Clause 2.3) " Information security is preservation of confidentiality, integrity and availability of information " (ISO IEC 27000 : 2017 Clause 2.33) Information security or InfoSec , is a broad discipline deals with prot