IUP Publications Online
Home About IUP Magazines Journals Books Archives
     
Recommend    |    Subscriber Services    |    Feedback    |     Subscribe Online
 
The IUP Journal of Computer Sciences :
InfoSec: A Comprehensive Study
:
:
:
:
:
:
:
:
:
 
 
 
 
 
 
 

Nowadays, the world runs on information. Information is nothing but solutions or answers to different types of queries. It is composed of well-defined data and operations. The information has led to the rise of knowledge and this knowledge has great potential to make or destroy nations. There are practically two sets of information—general purpose information such as this is year 2018 and sensitive information such as the nuclear codes of a country. There is no need to protect the general purpose information, but just imagine that one nation gets hold of the nuclear launch codes of another country; it can wreak havocs. With the development and advancement in the field of technology, there is a need to protect vulnerable information. This is where the Information Security or InfoSec answers the call. These are a set of methods used to protect valuable information as most of them reside over the interconnected systems of computer networks. It has a lot of positive aspects such as mobility and portability,, but also since everything is connected, there are ways to access other systems and steal or alter the information. This is called hacking and people involved in these works are termed as hackers. Thus, to protect the information, various methods have been proposed, and this paper studies some of the methods and their working principles.

 
 
 

Information security is not a new concept, but in the field of Information Technology, it is rather newer and is improving each day. The world is changing at a fast rate technologically, and with all the change, it is rather necessary to keep the safeguarding mechanisms updated. InfoSec is the process of preventing unauthorized access, usage, modification, disruption or manipulation of data, physical or electronic. Its main focus is the balanced approach to data’s confidentiality, integrity and availability without hurdling an organization’s productivity (Andress, 2014). For years, the researchers and professionals have been working to generate methods for the better protection of information from those known as hackers. These approaches include password authentication, firewall, anti-virus, encryption systems and many more (https://www.wisegeek.com/what-is-information-security.htm). But the data cannot only be compromised by the hackers, and at times, there can be natural calamities too which can lead to the destruction of data, machine malfunction and theft. Although the traditional method of information storage is still prevalent with their own set of InfoSec methodologies, we are going to put a stress on the digital information exchange and security of these digital media in this paper as the world is on the verge of a major technological revolution with the widespread network of interconnected machines and fast medium of transacting data from one node to another.

 
 
 

Computer Sciences IUP Journal, InfoSec, Information security, Hacking, Encryption, Decryption, Security.