Yes most of us already have insight of this already but security knowledge must taught all day in everyday lives.
So let's begin.
We are going to look at the security objectives and how we can protect ourselves why we surf the internet.
WHAT IS SECURITY?
According to credit
Security for information technology (IT) refers to the methods, tools and personnel used to defend an organization's digital assets. The goal of IT security is to protect these assets, devices and services from being disrupted, stolen or exploited by unauthorized users, otherwise known as threat actors. These threats can be external or internal and malicious or accidental in both origin and nature.
Also, AIS defined it as the protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability and confidentially of information system resources ( including hardware, software, firmware and information/ data and telecommunication).
There are models of Network Security.
Basically we have too model which we use today globally. Without a sender there would be no receiver. In between this structure we have the third party in between.
The third party act as the bridge between the sender and receipient. Not forgetting the security third party acts as the opposition to attackers of the networks.
BEST STRUCTURES FOR NETWORK SECURITY.
The algorithm must be capable to secure messages
It must have a good potential to be able to distribute and sharing of secured Information.
FEATURES OF A GOOD NETWORK SECURITY
Confidentiality- information not been disclosed
Integrity - Data cannot be modified in an unauthorized manner.
Availability- Information working perfectly.
Authenticity- Being Geniue
Accountability- Non-Repuridatory
SECURITY ARCHITECTURE
SECURITY ATTACKS
Any action that compromise the security of Information owned by an organization.
SECURITY MECHANISMS: A Process designed to detect, prevent or recover information from a security attack.
SECURITY SERVICES:
A processing or Communication services that enhances security of the data processing systems and the information transfers. The services are intended to counter security attacks, and they make use of one or more security Mechanism.
Security attacks are classed into passive and active attacks.
PASSIVE ATTACKS
Passive attacks learn or make use of information but do not affect the system. Just like when you looking a code and collect something important from it without it having effect on your security.
ACTIVE ATTACKS
Passive attacks attempt to affect the system/ resources/and their operations. E.G when your wallet is hacked.
Ensure to take your security as a priority never share important details to people anyhow!