In: Computer Science
Discusses at least five emerging threats to information security.
Provides guidelines for creating strong passwords.
Information security means protecting information (data) and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
Information Security management is a process of defining the security controls in order to protect the information assets.
1.Any potential danger to information or systems.
2.A threat is a possibility that someone (person, s/w) would
identify and exploit the vulnerability.
3.The entity that takes advantage of vulnerability is referred to
as a threat agent. E.g.: A threat agent could be an intruder
accessing the network through a port on the firewall.
4.Exploiting information via remote access software
5.Sharing sensitive files on P2P networks.
6.Careless use of wireless networks
Use a unique password for each of your important accounts.
Use a mix of letters, numbers, and symbols in your password.
Don't use personal information or common words as a password.