Sec
Sec
• Organizations must allocate funds for security and ensure that they
are ready to detect, respond to, and proactively prevent, attacks such
as phishing, malware, viruses, malicious insiders, and ransomware.
What are the 3 Principles of Information
Security?
• The basic tenets of information security are confidentiality, integrity
and availability. Every element of the information security program
must be designed to implement one or more of these principles.
Confidentiality
• Confidentiality measures are designed to prevent unauthorized
disclosure of information. The purpose of the confidentiality principle
is to keep personal information private and to ensure that it is visible
and accessible only to those individuals who own it or need it to
perform their organizational functions.
Integrity
• Consistency includes protection against unauthorized changes
(additions, deletions, alterations, etc.) to data. The principle of
integrity ensures that data is accurate and reliable and is not modified
incorrectly, whether accidentally or maliciously.
Availability
• Availability is the protection of a system’s ability to make software
systems and data fully available when a user needs it (or at a specified
time). The purpose of availability is to make the technology
infrastructure, the applications and the data available when they are
needed for an organizational process or for an organization’s
customers.
Information Security vs Cybersecurity
• Information security differs from cybersecurity in both scope and purpose.
The two terms are often used interchangeably, but more accurately,
cybersecurity is a subcategory of information security. Information security is
a broad field that covers many areas such as physical security, endpoint
security, data encryption, and network security. It is also closely related to
information assurance, which protects information from threats such as
natural disasters and server failures.
Enterprise grade platforms and cloud services have security features, but these must be
configured by the organization. Security misconfiguration due to negligence or human
error can result in a security breach. Another problem is “configuration drift”, where
correct security configuration can quickly become out of date and make a system
vulnerable, unbeknownst to IT or security staff.
Victims typically know about the attack Victims typically do not know about the
attack.
Main security focus is on detection and Main security focus is on prevention.
mitigation.