JASC: Journal of Applied Science and Computations ISSN NO: 1076-5131 INFORMATION SECURITY 1 Jelsteen.J, 2 M. Nithya Shree, 3K.Meenashi, 1Assistant Professor, MCA., M.Phil( P.hD), Department of BCA 2, 3 II BCA, Department of BCA Sri Krishna Arts and Science College, Coimbatore
[email protected] [email protected] [email protected] Abstract The concept of belief is currently not present in our environment. Users of internet are always in verge of threat by unknown resources. Threats can be received by any means, for example through emails and messages. Lots of attention should be earned from the people towards protecting their private information and alertness towards the threats from unauthorized resources. With this inspiration in our minds we have tried to bring out the possible threats and defenses against it. And also to explain the common methods hackers handle to breach our information. figure :1 Introduction Information security also called as infosec is a practice of protecting the users from unknown access, replacement of information and destruction of the data. Information security further ensures the confidentiality, integrity and availability. This kind of protection for the users is the primary aim of the information security. 1. Confidentiality: Confidentiality means information is not revealed to unauthorized websites, individuals and organizations. 2. Integrity: It ensures the accuracy of the information in its lifecycle [1]. In other words, information cannot be rewritten by unauthorized users. 3. Availability: To satisfy the needs of the users ,an information should be available to them whenever they need. It also ensures to block the denial of service attack which inhibits the availability of information.