Page 77 - Demo
P. 77


                                    %u062c%u0645%u064a%u0639 %u0627%u0644%u062d%u0642%u0648%u0642 %u0645%u062d%u0641%u0648%u0638%u0629 %u0640 %u0627%u0625%u0644%u0639%u062a%u062f%u0627%u0621 %u0639%u0649%u0644 %u062d%u0642 %u0627%u0645%u0644%u0624%u0644%u0641 %u0628%u0627%u0644%u0646%u0633%u062e %u0623%u0648 %u0627%u0644%u0637%u0628%u0627%u0639%u0629 %u064a%u0639%u0631%u0636 %u0641%u0627%u0639%u0644%u0647 %u0644%u0644%u0645%u0633%u0627%u0626%u0644%u0629 %u0627%u0644%u0642%u0627%u0646%u0648%u0646%u064a%u062977These vulnerabilities can be found by authentication processes, authorizing users, etc. Cloud security Cloud security focuses on building and hosting secure applications in cloud environments. The word %u201ccloud%u201d simply means that the %u201capplication%u201d runs in a common environment; therefore, it must be ensured that there is adequate isolation between the different processes in the common environments. Encryption Digital signatures are often used in cryptography to validate data access. Infrastructure security Infrastructure security deals with the protection of internal and external networks, laboratories, data centers, servers, desktop computers, and mobile devices. Response Incident response is the function that monitors and investigates potentially harmful behavior. Vulnerability management Vulnerability management is the process of scanning the environment for vulnerabilities (such as unrooted software), and prioritizing remediation based on risks. Information Security Threats Malware Are programs with ill intents and includes: - Viruses: They are small programs written in computer language that access and tamper with the data stored on it, including what may be hidden and cannot be seen and observed. The source of viruses is from unreliable websites and emails, and counterfeit programs that are not original, and these viruses may spread when Using storage devices without making sure that they are free of viruses. - Worms are Independent computer programs that copy themselves from one computer to other computers over a network. - Trojan horses hide themselves and open a backdoor for an attacker to use the computer. 
                                
   71   72   73   74   75   76   77   78   79   80   81