Information security is a set of practices designed to protect information from various forms of threats. These threats can compromise the integrity, confidentiality, and availability of information. In this chapter, we'll explore the basics of information security.

2.1 Confidentiality, Integrity and Availability (CIA)

Confidentiality, integrity, and availability, also known as the CIA triangle, are the three main objectives of information security.

Confidentiality is ensuring that information is accessible only to those authorized to have access. It is protected by laws and regulations, which impose severe penalties for its violation.

Integrity involves ensuring the accuracy and completeness of information and processing methods. It is crucial to maintaining data consistency, accuracy, and reliability throughout its lifecycle.

Availability ensures that information and related resources are available to authorized users when needed. This includes maintaining hardware, performing software updates, and preventing denial of service attacks.

2.2 Threats to Information Security

Threats to information security can be classified into two main categories: internal and external threats.

Insider threats are those that come from within the organization, such as employees, former employees, partners or contractors. They have privileged access to the system and can cause significant damage.

External threats are those that come from outside the organization. These can include hackers, competitors, terrorists or foreign governments. They can use various techniques such as phishing, malware or brute force attacks to compromise information security.

2.3 Information Security Measures

Information security is protected by a combination of physical, technical and administrative measures.

Physical measures include physical access controls such as locks, access cards, and security cameras. They may also include the secure destruction of sensitive information.

Technical measures include encryption, firewalls, antivirus and intrusion detection systems. They can also include network security practices such as network segmentation and implementing virtual private networks (VPNs).

Administrative measures include security policies and procedures, security training, and security audits. They may also include access rights management and security incident management.

2.4 Laws and Regulations

Information security is regulated by various laws and regulations. These may vary depending on the country and type of information. These can include data protection laws, privacy laws, cybersecurity laws, and industry regulations such as PCI DSS for the payment card industry and HIPAA for the healthcare industry.

Knowing and understanding these basic information security concepts is the first step in protecting your information and systems from threats. In the next chapter, we will explore more deeply the techniques and tools used in information security.

Now answer the exercise about the content:

_Which of the following is one of the top three objectives of information security as described in the CIA triangle?

You are right! Congratulations, now go to the next page

You missed! Try again.

Article image History of Information Security

Next page of the Free Ebook:

3History of Information Security

3 minutes

Obtenez votre certificat pour ce cours gratuitement ! en téléchargeant lapplication Cursa et en lisant lebook qui sy trouve. Disponible sur Google Play ou App Store !

Get it on Google Play Get it on App Store

+ 6.5 million
students

Free and Valid
Certificate with QR Code

48 thousand free
exercises

4.8/5 rating in
app stores

Free courses in
video, audio and text