Elements of Information Security
Information security is the practice of protecting information and infrastructure from theft, tampering, and disruption. It ensures that risks remain low or manageable. This security relies on five key elements:
Confidentiality – Ensuring only authorized individuals can access information.
- Breaches occur due to hacking or mishandling of data.
- Controls: Data encryption, classification, and secure disposal of media (DVDs, CDs, etc.).
Integrity – Ensuring data is accurate, consistent, and protected from unauthorized changes.
- Integrity violations can result from unauthorized access or accidental changes.
- Controls: Checksums (to detect changes) and access controls (to restrict modifications).
Availability – Ensuring systems are operational and accessible when needed.
- Threats include system failures, malware, and cyberattacks.
- Controls: Redundant systems, antivirus software, and DDoS prevention.
Authenticity – Ensuring data, communications, and users are genuine.
- Prevents identity fraud and data manipulation.
- Controls: Biometrics, smart cards, and digital certificates.
Non-Repudiation – Preventing denial of actions or transactions.
- Ensures a sender cannot deny sending a message, and a receiver cannot deny receiving it.
- Controls: Digital signatures and secure logs.
Comments