Information Security Attributes: or qualities, i.e., Confidentiality, Integrity
and Availability (CIA). Information Systems are composed in three main portions, hardware, software and communications with the purpose to help identify and app ly information security industry standards, as mechanisms of protection and prev ention, at three levels or layers: physical, personal and organizational. Essent ially, procedures or policies are implemented to tell people (administrators, us ers and operators) how to use products to ensure information security within the organizations. The definitions of InfoSec suggested in different sources are summarized below ( adopted from).[3] 1. "Preservation of confidentiality, integrity and availability of information. Note: In addition, other properties, such as authenticity, accountability, non-r epudiation and reliability can also be involved." (ISO/IEC 27000:2009)[4] 2. "The protection of information and information systems from unauthorized acce ss, use, disclosure, disruption, modification, or destruction in order to provid e confidentiality, integrity, and availability." (CNSS, 2010)[5] 3. "Ensures that only authorized users (confidentiality) have access to accurate and complete information (integrity) when required (availability)." (ISACA, 200 8)[6] 4. "Information Security is the process of protecting the intellectual property of an organisation." (Pipkin, 2000)[7] 5. "...information security is a risk management discipline, whose job is to man age the cost of information risk to the business." (McDermott and Geer, 2001)[8] 6. "A well-informed sense of assurance that information risks and controls are i n balance." (Anderson, J., 2003)[9] 7. "Information security is the protection of information and minimises the risk of exposing information to unauthorised parties." (Venter and Eloff, 2003)[10] 8. "Information Security is a multidisciplinary area of study and professional a ctivity which is concerned with the development and implementation of security m echanisms of all available types (technical, organisational, human-oriented and legal) in order to keep information in all its locations (within and outside the organisation's perimeter) and, consequently, information systems, where informa tion is created, processed, stored, transmitted and destroyed, free from threats . Threats to information and information systems may be categorised and a correspo nding security goal may be defined for each category of threats. A set of securi ty goals, identified as a result of a threat analysis, should be revised periodi cally to ensure its adequacy and conformance with the evolving environment. The currently relevant set of security goals may include: confidentiality, integrity , availability, privacy, authenticity & trustworthiness, non-repudiation, accoun tability and auditability." (Cherdantseva and Hilton, 2013)[3]
ChatGPT Millionaire 2024 - Bot-Driven Side Hustles, Prompt Engineering Shortcut Secrets, and Automated Income Streams that Print Money While You Sleep. The Ultimate Beginner’s Guide for AI Business
Excel 2023 for Beginners: A Complete Quick Reference Guide from Beginner to Advanced with Simple Tips and Tricks to Master All Essential Fundamentals, Formulas, Functions, Charts, Tools, & Shortcuts
ChatGPT Side Hustles 2024 - Unlock the Digital Goldmine and Get AI Working for You Fast with More Than 85 Side Hustle Ideas to Boost Passive Income, Create New Cash Flow, and Get Ahead of the Curve