Inspite we live in the era of information technology, it provides unlimited facilities to access information. It is not so far the days that we had to search the right library and then find the right source among thousands of books for obtaining the information we were looking for, but today, with a popular expression, information is just as close as hitting a key.
It is very natural that keeping confidential information is very hard in such an environment as it is so easy to access every information.
Information security, in general terms, is the whole of the work carried out against acquiring the information required to be protected, harm, the use, modification and recording of this information by unauthorized persons.
Although the concept of information security today is almost synonymous with cyber security, the work done to protect information is very old. We know that special messages from Julius Caesar, the great leader of the Roman Empire who lived in the 1st century BC, were tried to be kept safe with the technique we call Caesar Encryption today. The example of a more recent past is the struggle of intelligence and intelligence counterattack in the Second World War. Germany’s legendary crypto device Enigma, today when it is called cryptology, is the first thing that comes to mind even for people who are not interested in this science.
Is information security important just to ensure the confidential information and communication security of states?
Without any doubt, No..!
Information security is an essential aspect of commercial secrecy and even personal privacy. The steps that commercial companies take before their competitors, the policies and strategies they pursue, the R & D work they do, the financial actions and many other issues have a very delicate balance based on the provision of information security. We are using our mobile phones by dialing the pin code, personal privacy has a priority of everything…
The most interesting statistic on this subject comes up when judicial cases related to cyber security are examined. The new trend of information security violation is seizing digital game accounts… Yes, even though every day we hear an internet fraud news, the case of unloading the bank account, the digital game account theft is surprisingly the same size illegal revenue gate.
While talking about communication security, computer security, cryptographic security, RF security, optical security etc. coming across with information security in a much simpler phase of our life leads us to watch a thief-police struggle that develops with technology … And as a part of this struggle, we have to learn living by keeping in mind dozens of passwords to be used at every step we take in the virtual world today. How satisfied or dissatisfied we are in this situation, no commment…
This article was published in periodical “Science and Technology to Everybody (Herkese Bilim Teknoloji)”, September 16, 2016