Research Suspense On It Security
Research Suspense On It Security
Confidentiality
Integrity
Availability
Together, these principles are known as the CIA Triad. Every
infosec program must follow these principles for maximum
effectiveness.
CONFIDENTIALITY
This first principle is meant to prevent the unauthorized access or
disclosure of enterprise information; it seeks to assure that only
authorized users have access to data. The confidentiality principle
is considered to be compromised when someone who doesn’t have
the proper authorization is able to access your organization’s data
and then damage, compromise, or delete it.
INTEGRITY
Data integrity is about maintaining the data’s accuracy,
trustworthiness, consistency, and reliability. This means that the
data should not be compromised or improperly modified (either
inadvertently or maliciously) by someone without the proper
authority.
AVAILABILITY
Availability means that information is easily accessible to
authorized users whenever needed, minimizing interruptions or
downtime.
That said, other principles also govern infosec and enhance its
effectiveness.
Non-repudiation
The National Institute of Standards and Technology (NIST) defines
non-repudiation as assurance that the sender of information “is
provided with proof of delivery and the recipient is provided with
proof of the sender’s identity, so neither can later deny having
processed the information.”
Risk management
Risk management allows organizations to identify risks to
information, then protect that information without hampering
access or productivity. Risk management also helps a company
determine the level of risk it is willing to tolerate and implement
safeguards to reduce this risk.
Data classification
Data classification categorizes data according to type, sensitivity,
and impact in case it is compromised or stolen. Data can be
classified to improve access control and determine how long it
should be retained.
High sensitivity
Medium sensitivity
Low sensitivity
Another is by access:
Public
Internal-only
Confidential
Restricted
A disaster recovery plan helps the company regain use of its critical
information systems and IT infrastructure as soon as possible after
a disaster. It assures that data remains available and unchanged,
which reduces the risk of data loss. Data backups and redundant
systems are two common BC/DR strategies in infosec.
Change management
A formal change management process is also crucial for infosec.
When data and system changes are not managed properly, that can
lead to outages that affect availability, prevent authorized users
from accessing the data they need, or otherwise harm security.
2. Malware
Malware is a destructive program that bypasses enterprise security
systems, such as firewalls, to infect enterprise networks. It allows a
malicious actor to infect, explore, or steal information. Malware
comes in many variants, including:
Adware
Malvertising
Botnet
Remote administration tools (RATs)
Rootkits
Spyware
Attackers may attack information security (and IT security in
general) with malware through many channels, including:
Email attachments
File servers
File sharing software
Peer to peer (P2P) file sharing
Exploit kits
Remote systems
3. Ransomware
Ransomware is malware that allows an attacker to encrypt data or
lock users out of their systems. The attacker demands a ransom
payment from the victim before restoring access to the data. The
number of ransomware attacks worldwide stands at a staggering
493.33 million as of 2023, and the average ransom demand is $4.7
million. This is one of the biggest cyber risks today.
4. Phishing scams
In a phishing scam, hackers trick victims into revealing
confidential or sensitive information, such as login credentials or
financial data.
Most phishing scams start with fake emails that appear to be from
legitimate sources. The email includes a malicious link or
attachment. When the victim clicks on the link, they are directed to
the fake website, where the victim is fooled into giving up sensitive
data. Sometimes opening an attachment installs malware on the
victim’s system that can harvest sensitive data for the attacker.
6. Insider threats
Careless and malicious insiders are both serious information
security threats. Organizations have experienced a substantial
surge in the cost of credential theft, soaring by 65 percent, from
$2.79 million in 2020 to a staggering $4.6 million today. Moreover,
incidents that took over 90 days to contain have proven to be even
more