Information Security
Information Security: what is it?
Information Security is not limited to preventing unauthorized access to data. Information security is the activity of protecting data from unauthorized access, use, disclosure, interruption, alteration, inspection, or destruction. Information might be either physical or digital. Information might include anything from your personal details to your social media presence, cell phone data, biometrics, etc. Consequently, Information Security encompasses numerous academic fields, such as Cryptography, Mobile Computing, Cyber Forensics, Online Social Media, etc.
Considering the sensitivity of information, the Multi-tier Classification System was established during the First World War. With the start of the Second World War, the Classification System was formally aligned. Alan Turing successfully deciphered the German Enigma Machine, which was employed to encrypt military data.
Commonly referred to as CIA - Confidentiality, Integrity, and Availability - these three goals form the foundation of Information Security systems.
Confidentiality entails that information is not disclosed to unauthorised individuals, organisations, or processes. For instance, supposing I have a password for my Gmail account, but someone observed me logging into my account. In such a circumstance, my password has been leaked, and confidentiality has been compromised.
2. Integrity - ensuring data accuracy and completeness This indicates that data cannot be altered in an illegal manner. For instance, if an employee leaves an organization, data for that employee in all departments, such as accounts, should be updated to reflect status as JOB LEFT so that data is comprehensive and accurate, and only authorized individuals should be permitted to alter employee data.
3. Availability - indicates that information must be accessible when required. For instance, if it is necessary to access an employee's information in order to determine whether he or she has accrued an excessive number of leave days, it requires the collaboration of multiple organizational teams, such as network operations, development operations, incident response, and policy/change management.
One of the factors that can impede the accessibility of information is a denial of service attack.
One other concept governs information security initiatives apart from this one. This is known as Non repudiation.
0 Comments