Information security intro
Information security intro
What is Confidentiality?
1. Encryption
2. Password
3. Two-factor authentication
4. Biometric verification
What is Integrity?
Upholding integrity means that measures are taken to ensure that data is kept
accurate and up to date. The integrity of your data impacts how trustworthy and
conscientious your organization is. One of the eight Data Protection Principles
(which are the foundations of the Data Protection Act 2018) is that data should be
‘kept accurate and up to date’. Users must make sure that they comply with their
legal duties and fulfil this requirement. It can be useful to assign individuals
specific roles and responsibilities regarding data integrity. These way employees
cannot shelve the responsibility and expect someone else to pick up the slack.
1. Encryption
3. Version control
What is Availability?
1. Off-site backups
2. Disaster recovery
3. Redundancy
4. Failover
5. Proper monitoring
6. Environmental controls
7. Virtualization
8. Server clustering
The goal of identity and access management is to ensure the right people have
the right access to the right resources and unauthorized users can't get in.
Authentication -- the process of determining users are who they claim to be -- is
one of the first steps in securing data, networks and applications.
Requiring users to provide and prove their identity adds a layer of security
between adversaries and sensitive data. With authentication, IT teams can
employ the principle of least privilege to limit what employees can see. The
average employee, for example, doesn't need access to company financials, and
accounts payable doesn't need to touch developer projects.
1. Password-based authentication
dictionary words and publicly available personal info. Further, employees need a
password for every application and device they use, making them difficult to
remember and leading employees to simplify passwords wherever possible.
Companies should create password policies restricting password reuse. Password
policies can also require users to change passwords regularly and require
password complexity, such as meeting a certain length and using special
characters.
2. Two-factor/multifactor authentication
The strength of 2FA relies on the secondary factor. Attackers can easily breach
text and email. Using biometrics or push notifications, which require something
the user is or has, offers stronger 2FA. Be careful when deploying 2FA or MFA,
however, as it can add friction to UX.
3. Biometric authentication
Biometrics uses something the user is. It relies less on an easily stolen secret to
verify users own an account. Biometric identifiers are unique, making it more
difficult to hack accounts using them.
Iris recognition scans the user's eye with infrared to compare patterns
against a saved profile.
Information Security
4. Single sign-on
This authentication method does mean that, if an IdP suffers a data breach,
attackers could gain access to multiple accounts with a single set of credentials.
SSO also requires an initial heavy time investment for IT to set up and connect to
its various applications and websites.
5. Token-based authentication
Information Security
Tokens make it difficult for attackers to gain access to user accounts. Attackers
would need physical access to the token and know the user's credentials to
infiltrate the account.
Employees must be trusted to keep track of their tokens, or they may be locked
out of accounts. Because users are locked out if they forget or lose the token,
companies must plan for a reenrollment process.
6. Certificate-based authentication