Tree key concepts of Information Security every IT expert must know.
- Confidentiality: Refers to protect information from disclosure to unauthorized parties.Method used are :
- Encryption
- Enforcing file permissions
- Access Control list to restrict access to sensitive information.
2.
Integrity: Refers
to protect information from being modified by unauthorized parties.
Method used is:
- Hashing Data you receive and comparing it with the hash of the original message.
3.
Availability:
Refers to ensuring that authorized
parties are able to access the information
when needed.
- Methods used are:
- Back up is key Priority
- Redundancy might be appropriate
- Having an off-site location ready to restore services in case anything happens to primary data center.
Other main terms referring information security are
:
- Authentication
- Authorization
- Non- Repudiation.

Comments