Information security

Name: Haider Abbas
Department: BS IT (4TH)
Course: Information Security
Reg No: 2018-KIU-5495
Information Security
The process of secure your information from unauthorized acess , modification, or misuses is called
Information Security.
Every single user or an organization have their own personal sequenced data which require prevention
from unauthorized access. Information Security is basically the protective steps take to guard our
information and our capabilities.
Prevention of Information on Internet
Security is the basic need of any Information. Unauthorized access, misuse or modification cause serious
problems to Information Owner. We can secure our information on internet by using different tips.
Some of them are:-
Two Factor Authentication 2(FA)
Two factor authentication is basically a layer of another security over a security which make your
information further strong. It is additional password, confirmation message or multi questions pattern
which guard your information more tightly.
Don’t use same password everywhere
Multiple accounts requires multiple passwords for Security. The tip is that don’t use same password in
many accounts as it is harmful for information security.
Updated Softwares instead of Antiviruses
Experts use their software Updates instead of Antiviruses which is one of the most secure decision for
information Security.
Application Softwares Risk
No doubt application softwares are our basic need but some softwares can leak our information by
taking our accounts passwords as a part of their process. So while using any Application Software we
have to be careful and never share personal information without security sure.
Common Threats for Information Security
Some of common threats in Digital world for our information are:-
Botnet is multiple internet connected devices in which each of one running one or more bots. Botnet
can be use to perform distributed denial of service attacks, steal data, send spam, and allow attacker to
access device and its connection.
Malware is any type of Software which is made intentionally to damage the computer, server, or a
network. Examples are viruses, worm, spyware, rogue software, Trojan horses etc.
Spamming is electronic junk mail or unsolicited messages send to number of recipents for commercial or
non-commercial purposes. Most of it is send by botnets and it is one of the serious threat against
information Security.
Hacking is the most serious issue in digital world especially in social media accounts it become a serious
Hacking is a broad term which refers to gain digital access to someones personal information and
modify, copy, or erase it. Hackers are one of the serious threat to information Security.
Denial of Service Attack (DDoS)
In computing DDoS is a cyber attack in which prepetrator seeks to make a machine or network
resources unavailable to its intended users by temporarily or indefinetly disrupting services of the host
connected to the internet.

Calculate the price
Make an order in advance and get the best price
Pages (550 words)
*Price with a welcome 15% discount applied.
Pro tip: If you want to save more money and pay the lowest price, you need to set a more extended deadline.
We know how difficult it is to be a student these days. That's why our prices are one of the most affordable on the market, and there are no hidden fees.

Instead, we offer bonuses, discounts, and free services to make your experience outstanding.
How it works
Receive a 100% original paper that will pass Turnitin from a top essay writing service
step 1
Upload your instructions
Fill out the order form and provide paper details. You can even attach screenshots or add additional instructions later. If something is not clear or missing, the writer will contact you for clarification.
Pro service tips
How to get the most out of your experience with
One writer throughout the entire course
If you like the writer, you can hire them again. Just copy & paste their ID on the order form ("Preferred Writer's ID" field). This way, your vocabulary will be uniform, and the writer will be aware of your needs.
The same paper from different writers
You can order essay or any other work from two different writers to choose the best one or give another version to a friend. This can be done through the add-on "Same paper from another writer."
Copy of sources used by the writer
Our college essay writers work with ScienceDirect and other databases. They can send you articles or materials used in PDF or through screenshots. Just tick the "Copy of sources" field on the order form.
See why 20k+ students have chosen us as their sole writing assistance provider
Check out the latest reviews and opinions submitted by real customers worldwide and make an informed decision.
Customer reviews in total
Current satisfaction rate
3 pages
Average paper length
Customers referred by a friend
15% OFF your first order
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Claim my 15% OFF Order in Chat