Lakhasly

Online English Summarizer tool, free and accurate!

Summarize result (45%)

introduction :

The great technological progress, the development of various means of communication and communications, the openness of the world to each other, and its reliance on sending various types of data through networks, all of this has created a risk of this data leaking and reaching the wrong people or competitors, and thus there has become an urgent need to maintain information security.Internet risks to information security There is a large group of weaknesses in the regular Internet network that enable unauthorized people to access this data, including programming errors made by programmers while building networks, or designing various applications, such as errors in how the application deals with input.Information security concept:

Information security is the complete control of information, in terms of determining who will receive this data, specifying the permissions to access it, and using a set of technologies in order to ensure that it is not penetrated by any party, and its importance doubles from maintaining privacy, to preserving important data such as customer accounts.Specialized professional certificates are given in the information security specialty, including: the (CISSP / Certified Information Systems Security Professional) certificate, and the (CEH / Certified Ethical Hacker) certificate.Data monitoring (Packet Sniffers): There are many applications that are able to know the movement of data leaving and entering the network, and by analyzing it, it is possible to determine the breaches that occurred in this network, and to know its location.Encryption: There are many protocols designed to encrypt data, preventing anyone who receives it from understanding it. The degree of complexity in this encryption varies.This field secures information and protects it from the dangers that surround it, and this field provides protection and security for computers from the previously mentioned malware, which is the biggest enemy of computers.This field is an existing science in itself.


Original text

introduction :


The great technological progress, the development of various means of communication and communications, the openness of the world to each other, and its reliance on sending various types of data through networks, all of this has created a risk of this data leaking and reaching the wrong people or competitors, and thus there has become an urgent need to maintain information security.


Information security concept:


Information security is the complete control of information, in terms of determining who will receive this data, specifying the permissions to access it, and using a set of technologies in order to ensure that it is not penetrated by any party, and its importance doubles from maintaining privacy, to preserving important data such as customer accounts. In banks.


Internet risks to information security There is a large group of weaknesses in the regular Internet network that enable unauthorized people to access this data, including programming errors made by programmers while building networks, or designing various applications, such as errors in how the application deals with input. Error, or due to poor memory distribution, and there are many programmers who design programs dedicated to penetrating systems and searching for their weak points.


Ways to maintain information security: A group of protection methods are used in order to maintain information security, including: Physical protection methods: There are many simple methods that must be followed in order to maintain information security, which is keeping the computer in a safe place, and putting a password. Secret it to prevent hackers from tampering, and the password must contain letters, numbers, and symbols. So that it is difficult to predict and change periodically. Using a firewall: A firewall is a device or application, and it is placed at the server and at the network filters, each according to its needs. Encryption: There are many protocols designed to encrypt data, preventing anyone who receives it from understanding it. The degree of complexity in this encryption varies. There are some systems that can be solved by returning to their encryption rules. Therefore, a complex method must be adopted, which makes it as difficult as possible to restore the text to its language before encryption. Of course, the decryption key is owned by the device receiving this data. Data monitoring (Packet Sniffers): There are many applications that are able to know the movement of data leaving and entering the network, and by analyzing it, it is possible to determine the breaches that occurred in this network, and to know its location. The more important and confidential the data is, the greater the means used to protect it, both physical and software. For example, server devices are placed in a place protected by various physical methods, including guards.


The importance of information security There is no doubt that the field of information security is of great importance, and this importance is evident in the matters previously mentioned. This field secures information and protects it from the dangers that surround it, and this field provides protection and security for computers from the previously mentioned malware, which is the biggest enemy of computers. The field of information security is one of the vital, renewable, and much-needed fields, as it is absolutely indispensable. This field is an existing science in itself. This science is taught in some universities and educational centers, and multiple certificates are awarded in it, such as: a bachelor’s degree, a master’s degree, and a doctorate. This specialty is widely spread in Western universities, and is taught in some Arab universities, such as: the Saudi Electronic University. Specialized professional certificates are given in the information security specialty, including: the (CISSP / Certified Information Systems Security Professional) certificate, and the (CEH / Certified Ethical Hacker) certificate. ), and this last certificate is one of the most famous professional certificates in this field.


At the conclusion of this research, everyone must be aware of the benefits of information security as an important tool for maintaining information privacy, in addition to improving information security and improving the method of preserving data and information, especially for companies, banks, and ministries.


Summarize English and Arabic text online

Summarize text automatically

Summarize English and Arabic text using the statistical algorithm and sorting sentences based on its importance

Download Summary

You can download the summary result with one of any available formats such as PDF,DOCX and TXT

Permanent URL

ٌYou can share the summary link easily, we keep the summary on the website for future reference,except for private summaries.

Other Features

We are working on adding new features to make summarization more easy and accurate


Latest summaries

هناك من يحاول ا...

هناك من يحاول البحث عن الروابط التي تجمع القديم بالحديث، والشرق بالغرب، فالباحث الدكتور علي الراعي ا...

الاضطراب النفسي...

الاضطراب النفسي هو نمط سيكولوجي أو سلوكي ينتج عن الشعور بالضيق أو العجز الذي يصيب الفرد ولا يعد جزءً...

أحدثت الطفرة ال...

أحدثت الطفرة الإلكترونية ثورة تحولية في نظم الاتصالات وأساليبها وطرائقها والوصول إلى المعلومات واستع...

قبيلة مالي(الما...

قبيلة مالي(الماندينغ) قد أسست على الأرض التي تشغلها دولة مالي اليوم عدة امبراطوريات أو ممالك أو دول،...

‏But, perhaps y...

‏But, perhaps your dessert of choice on a hot day is an ice-cream cone.lf so you should be glad for ...

ال يترتب على تق...

ال يترتب على تقديم العريضة للقاضي توليد خصومة قضائية الن الخصومة القضائية هي عبارة عن مجموعة من األع...

وفي الأخير يمكن...

وفي الأخير يمكن القول أن القياس السوسيومتري ساهم في تطور العديد من البحوث والدراسات خاصة في ميدان عل...

تلخيص النص: تع...

تلخيص النص: تعتبر التلوث الضوضائي شكلًا من أشكال التلوث الذي أصبح قاتلاً جدًا في الوقت الحاضر. يزدا...

Calpurnia is th...

Calpurnia is the Finch family's black cook since the death of Atticus's wife. Calpurnia is unique in...

سار النقد الأدب...

سار النقد الأدبي في أواخر القرن الثاني الهجري على مجموعة من القواعد والمبادئ نذكر منها ما يلي: 1. م...

Gemini add mor...

Gemini add more_vert Conversation avec Gemini edit Définition de convertisseur Ac Dc Afficher les ...

لذلك، عندما يكو...

لذلك، عندما يكون معدل تشتت أشعة الضوء المتتالية أعلى، فإنه سيؤدي إلى فرص أقل لاستعادة الإشارة المناس...