1. Integrity:
Assuring the data integrity and not being modified.
Example: Use of checksums or digital signatures to ensure that a file has not been altered during transmission.
2. Availability:
The assurance the information systems and data are accessible and operating correctly, when needed.
Example: A website staying online and running smoothly when there is high traffic.
3. Confidentiality:
Ensuring that only authorized people or systems can access sensitive information.
Example: Encrypting a file so only the person with the correct password can open it.
4.Access Control:
Access control refers to the practice of regulating who can access specific resources, data, or systems within an organization.
5. Authentication:
Confirmation that users or systems are who they claim to be.
Example: Accessing an account using a password or two-factor authentication, such as a text message code, to validate your identity.
6.Encryption:
The transformation of information into a code to avoid unauthorized access.
Using encryption protocols for example SSL/TLS to secure transactions and communications over the internet.
7.Compliance:
Compliance in cybersecurity relates to the adherence to laws, regulations, policies, and standards established to safeguard sensitive data, systems, and networks. In essence, compliance protects organizations from potential legal penalties, improves security practices, and reinforces confidence with customers and stakeholders.
8.Incident Response:
Definition: Actions taken in response to a security breach or attack intended to minimize damage and recover systems.
Example: Isolate affected systems, investigate the breach, and recover lost data from backups.
9.Sedurity Architecture:
Security Architecture refers to a technical design for an organization's security framework including the policies, technologies, and process to protect data, systems, and networks from harm. It is essentially the blueprint of how security controls are applied across an IT environment to ensure confidentiality, integrity, and availability.
No comments:
Post a Comment