Skip to main content
Engineering LibreTexts

5.4: Summary

  • Page ID
    82322
  • \( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \) \( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)\(\newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\) \( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\) \( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\) \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\) \( \newcommand{\Span}{\mathrm{span}}\) \(\newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\) \( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\) \( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\) \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\) \( \newcommand{\Span}{\mathrm{span}}\)

    Summary

    Information security, sometimes shortened to infosec, is the practice of protecting information by mitigating information risks. It is part of information risk management.

    Authentication is the process of verification.

    Authentication is done in different ways, Multi-factor authentication, and Mutual authentication.

    A password is usually used to confirm a user's identity.

    Identification is basically the process of someone claiming to be a specific person.

    The Information Security Triad, CIA is Confidentiality, Integrity, and Availability.

    Use simple steps to make computers more secure.

    There are ethical and legal implications while using information systems.

    Information about a person that can be used to uniquely establish that person’s identity is called personally identifiable information.

    Computer Virus designed to spread from host to host and can replicate themselves.

    Malware is software that is specifically designed to gain access to or damage a computer, usually without the knowledge of the owner.


    5.4: Summary is shared under a not declared license and was authored, remixed, and/or curated by LibreTexts.

    • Was this article helpful?