Skip to main content
  1. Tech
  2. Gadgets & Tech
  3. Internet

CyberSecurity Concepts

See also

Information security is the method of providing confidentiality, integrity and availability to data, information, applications and equipment for those who needs it. The key concept to providing such a level of protection falls on the concept of The C.I.A. triangle which consist of:

  • Confidentiality
  • Integrity
  • Availability

Confidentiality of information ensures that only those with sufficient privileges may access certain information. To protect the confidentiality of information, a number of measures may be used including:

  • Information classification
  • Secure document storage
  • Application of general security policies
  • Education of information custodians and end users

Integrity is the quality or state of being whole, complete, and uncorrupted. The integrity of information is threatened when it is exposed to corruption, damage, destruction, or other disruption of its authentic state. Corruption can occur while information is being compiled, stored, or transmitted.

Availability is making information accessible to user access without interference or obstruction in the required format. A user in this definition may be either a person or another computer system.

Over time the list of characteristics has expanded to other key and important concepts, but The C.I.A. Triangle remain central core of Information Security. Some of the other key concepts of Information Security are:

  • Privacy – Information is to be used only for purposes known to the data owner.
  • Identification- Information systems possesses the characteristic of identification when they are able to recognize individual users.
  • Authentication – Authentication occurs when a control provides proof that a user possesses the identity that he or she claims.
  • Authorization – After the identity of a user is authenticated, a process called authorization provides assurance that the user (whether a person or a computer) has been specifically and explicitly authorized by the proper authority to access, update, or delete the contents of an information asset.
  • Accountability – The characteristic of accountability exists when a control provides assurance that every activity undertaken can be attributed to a named person or automated process.

Understanding these concepts and the controls that are associated with each will provide the security/system administrator with the proper capabilities to protect their organization.

Advertisement

Don't Miss

  • The Crew
    'The Crew' exclusive: New details on racing types, open-world, seamlessness and more
    Games Exclusive
  • Dirty hands
    Find out how to clean the gross gadgets you carry with you all the time
    Video
    Tech Buzz
  • Civ
    Need to catch up on 'Sid Meier's Civilization'? Here is everything you need to know
    Camera
    Games Feature
  • Contact lenses
    Google applies for patent for what could be the Google Glass successor
    Tech News
  • Upcoming
    These are 2014's biggest PS4, Xbox One and Wii U games
    Camera
    Games Feature
  • Microscope
    A brilliant doctor invents a microscope that can be created for less than 50 cents
    Video
    Headlines

User login

Log in
Sign in with your email and password. Or reset your password.
Write for us
Interested in becoming an Examiner and sharing your experience and passion? We're always looking for quality writers. Find out more about Examiner.com and apply today!