INFORMATION SECURITY

INFORMATION SECURITY

Information security, sometimes shortened to InfoSec,is the practice of protecting information by mitigating information risks. It is part of information risk management typically involves preventing or reducing the probability of unauthorized/inappropriate access to data, or the unlawful use, disclosure, disruption, deletion, corruption, modification, inspection, recording, or devaluation of information also involves actions intended to reduce the adverse impacts of such incidents. Protected information may take any form, e.g. electronic or physical, tangible (e.g. paperwork) or intangible (e.g. knowledge).Information security's primary focus is the balanced protection of the confidentiality, integrity, and availability of data (also known as the CIA triad) while maintaining a focus on efficient policy implementation, all without hampering organization productivity. This is largely achieved through a structured risk management process that involves:


identifying information and related assets, plus potential threats, vulnerabilities, and impacts;

evaluating the risks

deciding how to address or treat the risks i.e. to avoid, mitigate, share or accept them

where risk mitigation is required, selecting or designing appropriate security controls and implementing them

monitoring the activities, making adjustments as necessary to address any issues, changes and improvement opportunities.

To standardize this discipline, academics and professionals collaborate to offer guidance, policies, and industry standards on password, antivirus software, firewall, encryption software, legal liability, security awareness and training, and so forth. This standardization may be further driven by a wide variety of laws and regulations that affect how data is accessed, processed, stored, transferred and destroyed. However, the implementation of any standards and guidance within an entity may have limited effect if a culture of continual improvement isn't adopted.

The basic tenets of information security are confidentiality, integrity and availability. Every element of the information security program must be designed to implement one or more of these principles. Together they are called the CIA Triad.

Confidentiality

Confidentiality measures are designed to prevent unauthorized disclosure of information. The purpose of the confidentiality principle is to keep personal information private and to ensure that it is visible and accessible only to those individuals who own it or need it to perform their organizational functions.

Integrity

Consistency includes protection against unauthorized changes (additions, deletions, alterations, etc.) to data. The principle of integrity ensures that data is accurate and reliable and is not modified incorrectly, whether accidentally or maliciously.

Availability

Availability is the protection of a system’s ability to make software systems and data fully available when a user needs it (or at a specified time). The purpose of availability is to make the technology infrastructure, the applications and the data available when they are needed for an organizational process or for an organization’s customers.

To view or add a comment, sign in

More articles by Madhan B

  • WHATSAPP

    Introduction In the era of digital connectivity, WhatsApp has emerged as a quintessential tool, revolutionizing the way…

  • Django

    Introduction to Django Framework Django, an open-source web framework written in Python, has gained immense popularity…

  • Figma

    Introduction In recent years, Figma has emerged as a leading platform for collaborative interface design and…

  • Data Visualization

    Introduction Data visualization has emerged as a powerful tool for transforming complex datasets into intuitive and…

  • Machine Learning

    Introduction Machine learning (ML) has emerged as a transformative technology that holds the potential to revolutionize…

  • Cloud Computing

    Introduction In recent years, cloud computing has emerged as a revolutionary paradigm reshaping the landscape of…

  • PYTHON DEVELOPER

    Introduction: Briefly introduce Python as a popular programming language. Highlight the importance of efficient coding…

  • DATA ANALYTICS

    #snsinstitutions #snsdesignthinkers #snsdesignthinking #dataanalytics Introduction Brief explanation of data analytics…

  • WEB TECHNOLOGY

    #snsinstitutions #snsdesignthinkers #snsdesignthinking #webdevelopment 1. Modern JavaScript Explained For Dinosaurs…

  • E-Commerce

    #snsinstitutions #snsdesignthinkers #snsdesignthinking #ecommerce HubSpot is one of the top marketing and sales…

Others also viewed

Explore content categories