Fabio HENRIQUE PIZZAIA, Renata MIRELLA FARINA, F. Florian
{"title":"分析数据传输安全/信息安全","authors":"Fabio HENRIQUE PIZZAIA, Renata MIRELLA FARINA, F. Florian","doi":"10.35265/2236-6717-240-12850","DOIUrl":null,"url":null,"abstract":"This article aims to carry out an analysis about information security, areas that specifically deal with the protection of one or more sets of data, in the sense of preserving information and its respective values within a company, or for an individual in particular. Within this context, it is important to remember that the concept of data security or information security is inserted within a larger context, which is computer security, that is, the security of the systems themselves. Ensuring information security in a company, for example, is extremely necessary within a highly competitive market. It is worth emphasizing that information security works based on three tangents, which are confidentiality (where access to data is limited by permissions); integrity (the guarantee of the veracity of information); availability (access to information easily)","PeriodicalId":21289,"journal":{"name":"Revista Científica Semana Acadêmica","volume":"21 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"ANÁLISE DA SEGURANÇA NA TRANSMISSÃO DE DADOS/SEGURANÇA DA INFORMAÇÃO\",\"authors\":\"Fabio HENRIQUE PIZZAIA, Renata MIRELLA FARINA, F. Florian\",\"doi\":\"10.35265/2236-6717-240-12850\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This article aims to carry out an analysis about information security, areas that specifically deal with the protection of one or more sets of data, in the sense of preserving information and its respective values within a company, or for an individual in particular. Within this context, it is important to remember that the concept of data security or information security is inserted within a larger context, which is computer security, that is, the security of the systems themselves. Ensuring information security in a company, for example, is extremely necessary within a highly competitive market. It is worth emphasizing that information security works based on three tangents, which are confidentiality (where access to data is limited by permissions); integrity (the guarantee of the veracity of information); availability (access to information easily)\",\"PeriodicalId\":21289,\"journal\":{\"name\":\"Revista Científica Semana Acadêmica\",\"volume\":\"21 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-11-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Revista Científica Semana Acadêmica\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.35265/2236-6717-240-12850\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Revista Científica Semana Acadêmica","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.35265/2236-6717-240-12850","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
ANÁLISE DA SEGURANÇA NA TRANSMISSÃO DE DADOS/SEGURANÇA DA INFORMAÇÃO
This article aims to carry out an analysis about information security, areas that specifically deal with the protection of one or more sets of data, in the sense of preserving information and its respective values within a company, or for an individual in particular. Within this context, it is important to remember that the concept of data security or information security is inserted within a larger context, which is computer security, that is, the security of the systems themselves. Ensuring information security in a company, for example, is extremely necessary within a highly competitive market. It is worth emphasizing that information security works based on three tangents, which are confidentiality (where access to data is limited by permissions); integrity (the guarantee of the veracity of information); availability (access to information easily)