Information security to ensure confidentiality integrity and availability

1,039 views
931 views

Published on

According to Common Vulnerability Enumeration (CVE) database, there are 60,000+ common vulnerabilities, 900+ common weaknesses, 1014+ common configuration errors, over 150,000 security related events, and a large number of application related errors. This is enough to prove the dangerous environment in which sensitive information and information systems of enterprises reside.

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,039
On SlideShare
0
From Embeds
0
Number of Embeds
12
Actions
Shares
0
Downloads
14
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Information security to ensure confidentiality integrity and availability

  1. 1. Information Security to Ensure Confidentiality, Integrity and AvailabilityAccording to Common Vulnerability Enumeration (CVE) database, there are 60,000+ common vulnerabilities,900+ common weaknesses, 1014+ common configuration errors, over 150,000 security related events, and alarge number of application related errors. This is enough to prove the dangerous environment in whichsensitive information and information systems of enterprises reside.As the world transitioned from a paper based economy to a digital based one, enterprises today storeconfidential business details which include personal staff details, client lists, salaries, bank account details,marketing and sales information on computers. This has made matters easy for the cyber criminals who usethe vulnerabilities in the software to gain access to a system or network. Only through information securitythat enterprises can protect sensitive information and information systems “from unauthorized access, use,disclosure, disruption, modification, perusal, inspection, recording or destruction.”One of the core principles of information security is the CIA triad. The three main components of CIA triad areconfidentiality, integrity, and availability. The CIA is a well-known security model that puts emphasis on thethree key principles that need to be guaranteed in any kind of secure system; breach of any one of theseprinciples would lead to serious consequences for the people concerned.· ConfidentialityIt refers to the ability to hide the information from people who do not have the permission to access it. Thishelps to ensure that the data is not compromised and is not disclosed to unauthorized people. Some of themethods employed to ensure confidentiality is encryption and cryptography.· IntegrityIt refers to the ability of protecting the data from modification or deletion by unauthorized people. Dataintegrity ensures that the data is the accurate and unmodified version of the original data.· AvailabilityThough it is highly necessary to ensure that the data is unavailable to unauthorized people, it is equallyimportant to make sure that the data is available to authorized people. People who are authorized to accessinformation must not face any issues when accessing information that is needed.
  2. 2. To ensure information security, enterprises must collaborate with service providers who provide informationsecurity services such as information security consulting, identity & access management services,transformation & system integration services, and managed security services. This helps enterprises toensure not only confidentiality, integrity and availability of sensitive information but also security from cyberthreats, malware infections, Phishing attacks, web application attacks and so on.Related Links: managed security services, end user computing

×