Hashtag Technophile

Fundamentals of Security

Fundamentals of Security

Information Security vs. Information Systems Security

In the ever-evolving landscape of digital advancements, the terms “information security” and “information systems security” are often used interchangeably. However, a closer look reveals distinct focuses and scopes, each playing a crucial role in the overarching goal of securing sensitive data. Let’s delve into the nuances that differentiate these two critical domains.

Information Security: Safeguarding the Spectrum

It is an act of protecting information and data from unauthorized access, unlawful alteration and disruption, disclosure and corruption, and destruction. It is about the data that systems are holding, not about the systems themself.

(e.g) Personal Data, Medical report, etc.

Infosec

Information Systems Security: Guarding the Technological Infrastructure

In contrast, it is an act of protecting the systems that hold and process the critical information and data.

(e.g) Computer, Server, Network Device, Smartphone, etc.

ISS

Pillars of Security

Now, let’s explore the foundational pillars of security: confidentiality, integrity, availability, non-repudiation, and authentication. In the beginning, the guiding model of information security was known as the CIA Triad, incorporating Confidentiality, Integrity, and Availability. With the addition of Non-Repudiation and Authentication, it has evolved into the CIANA Pentagon model.

Confidentiality

It ensures that information is only accessible to those with the appropriate authorization.

Integrity

Moving on, Integrity ensures that data remains accurate and unaltered, unless modification is required.

Availability

It ensures that information resources are accessible and functional when needed by authorized users.

Non-Repudiation

It is guaranteeing that a specific action or event has taken place and cannot be denied by the parties involved.

AAAs of Security

  • Authentication – It is a process of verifying the identity of a user or system.
  • Authorization – It determines what actions or resources an authenticated user has permissions to perform.
  • Accounting – The act of tracking the user activities and resource utilization.

 

In conclusion, this exploration serves as a guide to demystify security fundamentals. Understanding the distinctions between information security and information systems security is crucial in fortifying our approach to securing sensitive data in the ever-evolving digital landscape.

Will see you in the upcoming article with the detailed content of each pillar of security with examples and various techniques to handle it.

To not miss it, do subscribe our newsletter to get notified!

Do follow our instagram page : hashtag_technophile

Make sure you rate or comment this article and if you are finding it more useful do share it with your friends, because that encourages me to write more!

Cheers! Until next time…❤️

QUIZ TIME – Comment down your answer!

In CIANA Pentagon model, N stands for?

0 0 votes
Article Rating
guest
2 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
Srivathsan
Srivathsan
1 year ago

Non-repudiation

Fhioe Dei
Fhioe Dei
11 months ago

N = Non-repudiation

Last edited 11 months ago by Fhioe Dei
Scroll to Top