SECURITY BASICS
Information Security (INFOSEC) Overview
Information Security (INFOSEC) means protecting important data or information from unauthorized access, use, damage, or theft. It ensures that data stays safe, correct, and available when needed.
Critical Information Characteristics
These are three main features that define how secure important data is:
a. Confidentiality
Means only authorized people can access the data.
Example: Your bank details should only be known to you and your bank.
b. Integrity
Means the information should be correct and not changed by unauthorized people.
Example: If someone changes your marks in the database, it breaks integrity.
c. Availability
Means information should be available whenever needed, especially to authorized users.
Example: If your college server is down and you can’t check your results, availability is lost.
Information States
Information goes through three states and each state must be protected:
a. Storage
When data is saved in devices (like hard drives, servers).
Example: Your college stores your records in a database. That data must be secure.
b. Processing
When data is being used or changed by a computer program.
Example: When your result is being calculated based on your marks.
c. Transmission
When data is being sent from one place to another.
Example: Sending your email or submitting a form online.
Security Countermeasures
These are the ways to protect data from threats and risks:
a. Education, Training, and Awareness
- People should be taught how to use systems securely.
- Training helps users avoid common mistakes like clicking on harmful links.
- Awareness helps people understand risks like phishing and social engineering.
b. Policy, Procedures, and Practices
- Policy: Set of rules for using systems securely (like password rules).
- Procedures: Step-by-step instructions for secure operations (like how to back up data).
- Practices: Everyday habits that ensure security (like locking your screen).
Threats
Threats are anything that can damage or misuse data or systems.
Examples:
- Hackers trying to break into a system
- Viruses and malware
- Natural disasters (like floods or fire damaging hardware)
- Human errors (like deleting files by mistake)
Vulnerabilities
Vulnerabilities are the weak points in a system that threats can attack.
Examples:
- Weak passwords
- Unpatched software
- Misconfigured servers
- Lack of user training
No comments:
Post a Comment