Your SlideShare is downloading. ×
Information security to ensure confidentiality integrity and availability
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Information security to ensure confidentiality integrity and availability

618
views

Published on

According to Common Vulnerability Enumeration (CVE) database, there are 60,000+ common vulnerabilities, 900+ common weaknesses, 1014+ common configuration errors, over 150,000 security related events, …

According to Common Vulnerability Enumeration (CVE) database, there are 60,000+ common vulnerabilities, 900+ common weaknesses, 1014+ common configuration errors, over 150,000 security related events, and a large number of application related errors. This is enough to prove the dangerous environment in which sensitive information and information systems of enterprises reside.


0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
618
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
9
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Information Security to Ensure Confidentiality, Integrity and AvailabilityAccording to Common Vulnerability Enumeration (CVE) database, there are 60,000+ common vulnerabilities,900+ common weaknesses, 1014+ common configuration errors, over 150,000 security related events, and alarge number of application related errors. This is enough to prove the dangerous environment in whichsensitive information and information systems of enterprises reside.As the world transitioned from a paper based economy to a digital based one, enterprises today storeconfidential business details which include personal staff details, client lists, salaries, bank account details,marketing and sales information on computers. This has made matters easy for the cyber criminals who usethe vulnerabilities in the software to gain access to a system or network. Only through information securitythat enterprises can protect sensitive information and information systems “from unauthorized access, use,disclosure, disruption, modification, perusal, inspection, recording or destruction.”One of the core principles of information security is the CIA triad. The three main components of CIA triad areconfidentiality, integrity, and availability. The CIA is a well-known security model that puts emphasis on thethree key principles that need to be guaranteed in any kind of secure system; breach of any one of theseprinciples would lead to serious consequences for the people concerned.· ConfidentialityIt refers to the ability to hide the information from people who do not have the permission to access it. Thishelps to ensure that the data is not compromised and is not disclosed to unauthorized people. Some of themethods employed to ensure confidentiality is encryption and cryptography.· IntegrityIt refers to the ability of protecting the data from modification or deletion by unauthorized people. Dataintegrity ensures that the data is the accurate and unmodified version of the original data.· AvailabilityThough it is highly necessary to ensure that the data is unavailable to unauthorized people, it is equallyimportant to make sure that the data is available to authorized people. People who are authorized to accessinformation must not face any issues when accessing information that is needed.
  • 2. To ensure information security, enterprises must collaborate with service providers who provide informationsecurity services such as information security consulting, identity & access management services,transformation & system integration services, and managed security services. This helps enterprises toensure not only confidentiality, integrity and availability of sensitive information but also security from cyberthreats, malware infections, Phishing attacks, web application attacks and so on.Related Links: managed security services, end user computing

×