Tree key concepts of Information Security  every  IT expert must know.

Image result for 3 pillars of information security

  1. Confidentiality: Refers to protect information from disclosure to unauthorized parties.
    Method used  are :
  • Encryption
  • Enforcing  file permissions
  • Access Control list to restrict access to sensitive information.
   2. Integrity: Refers to protect information from being modified by unauthorized parties.
     Method used  is:
  • Hashing Data you receive and comparing it with the hash of the original message.
   3. Availability: Refers  to ensuring that authorized parties are able to access the information    
        when needed.
  1. Methods used are:
  • Back up is key Priority
  • Redundancy might be appropriate
  • Having an off-site location ready to restore services in case anything happens to primary data center.
      Other main terms referring information security are :
  • Authentication
  • Authorization
  • Non- Repudiation.

  

Comments

Popular posts from this blog

Introduction To Big Data Forensics

CYBER SECURITY: Improving Cyber Defense Through Coherent Joint Red Team and Blue Team

Digital Forensics: Investigation VS Security