Common Questions About Information Security

26.07.2019

Efforts are made to keep our information secure. Passwords, authentication methods, antivirus software—all these measures make sure that your information, identity, and files remain untouched.

It all looks simple from the user’s end, but it’s a lot more complicated than that. Those responsible for maintaining information security follow a complex risk management process that encompasses assets, threats, vulnerabilities, outcomes, and many other elements.

We look further into what information security is all about and answered the most common questions about this process:

1. What does information security really mean?

Simply put, information security protects your confidentiality, the integrity of your information, and the availability of data stored in your computer.

Information security is technically the fancy term for ensuring your information doesn’t fall on the wrong hands.

Can you imagine your email account without a password? A bank account without a PIN? Your work computer without an antivirus software?

That’s information security at its most common modern applications. Developing security measures doesn’t happen overnight. It takes years of research and actual incidents to come up with an effective approach.

2. What are the basic principles of information security?

Information security is a process based on principles.

Confidentiality, integrity, and availability—these are the 3 pillars of information security.

Confidentiality of information means non-disclosure to unauthorized persons, entities or processes. If someone else knows the password to your social media account, your password (information) has been compromised. There is a clear breach of confidentiality in this example.

Integrity of information means preserving the accuracy and completeness of the information. Data should never be changed in an unauthorized manner. An employee who quits from his employer should not be able to access any of his office accounts. The organization should make sure that non-employees should no longer have access to company information, which can be changed. Integrity, in this case, may be compromised.

Availability of information means data should be available for access when needed. Law enforcers gather information from other government agencies as well. There should be prompt collaboration and understanding between various offices to make sure that information is available to those authorized to access it.

Collectively, these comprise the triad of information security, but more principles are now also followed:

Authenticity of information means that users should verify their identity. This principle ensures that the trusted source receives a genuine code through a valid transmission in real-time. After entering your password, your e-mail provider sends a unique code to your mobile number, which confirms that you are the user. Since both the password and the code match, the information is indeed authentic.

Accountability of information means that there should be a proper trail for every change in information. In an organization, there is a specific department authorized to change information. Such change must be documented and signed by the head of the department. This makes sure that the right people are accountable.

3. Are information security and cybersecurity the same?

No, they are two different terms even when people often use them interchangeably. They may overlap in some instances, but they should not be confused with each other.

Information security deals with protecting information itself, regardless if it’s electronically stored or otherwise.

In the 1900s, for instance, when people heavily relied on filing cabinets to store important files, they relied on padlocks or combination locks to prevent unauthorized access to these documents.

Cybersecurity deals with technologies and methods to protect networks, programs, data, computers—basically those within the cyber realm—from malicious attacks. Obviously, cybersecurity is not applicable to padlocks and filing cabinets that store confidential files.

In the modern sense, information security and cybersecurity may overlap. More users and companies now utilize a digital approach to store and protect their data and information.

4. Are there threats to information security?

Absolutely.

Let us not forget why information security is practiced in the first place. As you strengthen your security measures, attackers innovate their techniques to stay ahead.

A threat is anything that takes advantage of a system’s vulnerability. The goal is to gain access to information and alter, delete or harm a subject of interest.

A software attack is executed by viruses, worms, and other similar malicious programs. When these gain access to your system, you risk the integrity and availability of your information.

Malware is any malicious software that intrudes into your operating system. Once infected, it can replicate and pose a serious risk to the security of your information.

Phishing is a relatively new modus. Disguised as a legit website, it asks for your username and password, ultimately compromising the confidentiality of your information.

5. What’s the worst that could happen once a breach has happened?

Any data breach is a serious incident in all scales.

Perhaps the worst that could happen is losing all of your hard-earned money, in case of a breach of your financial account. If someone gets hold of your ATM details, it only takes minutes to withdraw all of your cash.

Individuals who gain unauthorized access to your personal information may use all of these for their own personal gain. Any con artist can open a bank account, apply for a passport, buy a car, sign documents—under your name.

Information is also a powerful tool for sabotage. Once an enemy gets hold of classified information, this can be used against the company. In effect, the damage to reputation, sales, and overall performance is severe.

favicon-196×196