The importance of information security today is not hidden from anyone who works in the field of information technology. Websites, various software, and networks are all constantly under threat,
and these threats and vulnerabilities are often addressed when a successful attack occurs but the incident must be remedied before it occurs.
Information security Because potential security threats can occur and cause damage at various levels, it is essential for a large portion of IT professionals to be familiar with the basics of information security.
Software developers have sufficient knowledge of information security to eliminate vulnerabilities in their products and to be able to identify where the problem is in the event of an attack.
Network administrators need to have enough information about the basics of information security to apply the necessary security protocols and be aware of existing vulnerabilities, not based on conventional rules and stereotypes, but precisely based on their network conditions and needs.
They must be able to prioritize threats, and in the event that a network is attacked,
they must be able to respond to threats as quickly as possible and minimize damage.
Many resources are available on various topics related to information security.
In some of these sources, it is enough to mention the do’s and don’ts without giving the audience a basic knowledge about why these do’s and don’ts,
and there are other categories of resources that are so specialized and detailed that not everyone can study them.
The Facebook website plans to publish a collection of articles on information security fundamentals.
This series of articles tries to explain the key and basic issues related to information security,
so that the reader acquires sufficient knowledge about the various security protocols and tools and knows how each works and On what basis are they designed?
Knowing this, the strengths and weaknesses of each can be identified and each tool is used in the right place and in the right way.
At the same time, addressing theoretical issues should not prevent one from engaging with real and practical issues. This series of articles, which will be gradually published on the Physite website, is written with such an approach.
This series covers articles on encryption, access control, security protocols, and software, respectively. The main reference in preparing these articles is the second edition of Information Security Principles and Practice.
This book is used as an academic reference in information security courses. The author of this book, Mark Stamp, is a professor at the University of San Jose in the United States and has written this book after 20 years of work in the field of information security.