You are on page 1of 1

Information Security - It is a very important in the field of technology to prevent possible attacks

that can destroy or steal the information.

1960s - organizations start to protect their computers where the most serious
security issues were at the points of entry and anyone with basic computer skills may break
into a facility and gain access to sensitive information

1970s - considered as the genuine birth year of Information Security

Identity theft - mainly reason for attacks during 1990s

Actions to be conducted when managing a risk:


1. Reduce the risk - This risk management action identifies and applies fixes to counter the
risk like setting up a firewall, establishing local and backup locations, and purchasing
water leak detection systems for a data center.
2. Accept the risk
3. Transfer the risk
4. Avoid the risk - This risk management action happens when you deny the existence or
potential impact of a risk, which is not recommended as it can lead to irreversible
consequences.

4 cryptologic components of information assurance:


1. Confidentiality
2. Integrity
3. Authenticity
4. Non-repudiation

You might also like