What is Information Security?

What is Information Security?
Information Security

Data security in other words is “Information Security”. If you are an information security expert or specialist then you have to ensure that CIA – Confidentiality, Integrity, and Availability of digital and physical data is maintained. So, let’s understand what is data and information

Data and Information

Data is a collection of alphabets, numbers, or symbols) that refer to, or represent, conditions, ideas, or objects. It is limitless and present everywhere in the universe. Processed form of data is Information.

For example: ‘15081947’ is data but, if we tell you that it’s a date of India’s independence then, it is an information. So, the processed form of data which has some meaning is information.

The information can be processed, stored, transmitted, modified, shared, deleted, destroyed, leaked, controlled, and handled properly or improperly.

Information Security

Information Security refers to the policies and processes which are created and implemented for the protection of information (confidential, private and/or sensitive) and information systems from unauthorized access, disclosure, use, modification, and/or destruction.

In information security you are generally concerned with the CIA – Confidentiality, Integrity, and Availability of information.

  • Confidentiality – prevents unauthorized disclosure of information
  • Integrity – protects information from being modified by unauthorized individuals
  • Availability – ensures the information is readily available for authorized users

Main responsibilities in information security include an establishment of business processes which will protect the information regardless of whether:

  1. it is in transit
  2. is being processed
  3. is at rest in storage

In information security, policies and procedures typically involves various measures to protect physical and digital data from unauthorized access. These measures include encryption, access controls, mantraps, password policies, network intrusion detection systems, and regulatory compliance.

Let’s understand “How Information Security is different from Cyber Security?” in our next article. Click here to read.

 

You may also like...

Leave a Reply