Definition of IT security
IT security is a set of cybersecurity strategies that prevents unauthorized access to organizational assets such as computers, networks and data.
Definition of physical security
Physical security is the protection of personnel, hardware, software, networks and data from physical actions and events that could cause serious loss or damage to an enterprise, agency or institution. This includes protection from fire, flood, natural disasters, burglary, theft, vandalism and terrorism.
Definition of password security
Password security is essential to protect your accounts and personal information from unauthorized access.
What is malware?
Malware, or malicious software, is any program or file that is intentionally harmful to a computer, network or server.
What is included in the threats to IT security?
A common threat is malware, or malicious software, which may come in different variations to infect network devices, including: Ransomware, Spyware, Viruses.
Types of physical security
Access control, Surveillance, Testing, Log and trail maintenance, Risk-based approach, Accountable access control.
Tips for creating secure passwords
1) Use strong password (12 characters long, mix of upper and lowercase letters, numbers and symbols).
2) Never use the same password for multiple accounts.
3) Change your passwords regularly.
4) Enable two-factor authentication.
5) Use password manager.
Types of malware
Computer viruses, worms, Trojan horses, ransomware, spyware.
Types of IT security
Network security, Internet security, Endpoint security, Cloud security, Application security.
What is access control?
The key to maximizing one's physical security measures is to limit and control what people have access to sites, facilities and materials. Access control encompasses the measures taken to limit exposure of certain assets to authorized personnel only. Examples of these corporate barriers often include ID badges, keypads and security guards. However, these obstacles can vary greatly in terms of method, approach and cost.
Types of password attacks
Brute force attacks, dictionary attacks, phishing attacks.
Unique traits of worm
A worm can self-replicate without a host program and typically spreads without any interaction from the malware authors.
What is network security?
Network security is used to prevent unauthorized or malicious users from getting inside your network. This ensures that usability, reliability, and integrity are uncompromised. This type of security is necessary to prevent a hacker from accessing data inside the network. It also prevents them from negatively affecting your users’ ability to access or use the network.
What is Accountable access control?
By tying access control to individuals, an organization can improve its visibility over personnel activity. Imagine a particular room can only be accessed by a single key, and that key is given to two people. If an asset in that room goes missing, then only those two people are accountable for its disappearance.
Tips of hardware security and maintenance
1) Use anti-theft devices (cable lock).
2) Protect against power surges (use a surge protector).
3) Keep ypur devices clean.
Unique traits of spyware
Spyware collects information and data on the device and user, as well as observes the user's activity without their knowledge.
What is Endpoint security?
Endpoint security provides protection at the device level. Devices that may be secured by endpoint security include cell phones, tablets, laptops, and desktop computers. Endpoint security will prevent your devices from accessing malicious networks that may be a threat to your organization.
What is application security?
Application security is a technique to protect applications and programming interfaces (APIs) to stop, identify the bugs and other intrusions in your applications. Application security characteristics contain documentation, authorization, encoding, and application security checking.
How protect personal information and prevent identity theft on the Internet
1) Use a secure connection (HTTPS).
2) Use antivirus software.
3) Be careful with email attachments.
4) Use strong passwords.
5) Be cautious with personal information.
What are the ways to get infected with malware?
Malware can get onto your device when you open or download attachments or files, download content available on file-sharing sites, or visit a scammy website.