An IT security violation can be described in accordance with six attributes of Parker Hexad. People who see two features appear. They are a nuclear and non-opera-ping nuclear because they could not break into more components and non-operative because they refer to unique aspects of information security. IT protects many of our security costs in security: Who determines or is unusual, which use?
How does the rating get the data as much or less secure as needed? Who are the data and why the data is reached? Which system is required to execute data? Where are these systems stored and used? Let us try to solve these questions with the best practice point.For our purposes, a cloud service user can be a person, a process or application, or a system such as a computing device. Support staff, when asked to resolve a problem,Users are ranked as well.If we were to follow the database, data generated from a user, passes on the network to access a computing system that hosts the software, in which the data in the storage device And stores, such as a solid state disk, and backbackup and finally on a backback device, after a period, is stored in an archived system. The elements that handle the data are given as described In Italian, users are, computing systems, software, storage devices, backup devices, and architects. And this wholeData must be protected from the travel user’s perspective. Specifies security measures for user privacy, data integrity, and security of other elements.