It is understood by computing the set of rules, procedures and tools that are intended to ensure the availability, integrity, confidentiality and proper use of the information that resides on an information system security.
Every day more and more people malicious attempt to access data from our computers.
Unauthorized access to a computer network or equipment that can cause it are the most severe cases of problems.
One of the possible consequences of an intrusion is the loss of data. It is a common occurrence and causes many problems, especially if we are not up to date backups. And while we are on the day, it is not always possible to recover all the data.
Another of the most damaging problems is the theft of sensitive and confidential information. The disclosure that a company has about its customers may bring claims against the millionaire, or closest to you is the example of our passwords of email accounts for which we exchange information with others.
With the constant evolution of computers is essential to know that resources need for security in information systems.
This report will discuss the importance of information security, we will references to the ways that exist to protect computer systems and the information they contain about unauthorized access, damage, modification or destruction.
With the constant evolution of computers is essential to know that resources need for security in information systems.
This report will discuss the importance of information security, we will references to the ways that exist to protect computer systems and the information they contain about unauthorized access, damage, modification or destruction.