Anzeige
Anzeige

Más contenido relacionado

Anzeige

PG & Associates

  1. PG & Associates
  2. Information Security Confidentiality Integrity Availability
  3. Information Security Confidentiality Assurance that information is shared only among authorised persons or organisations. Breaches of Confidentiality can occur when data is not handled in a manner adequate to safeguard the confidentiality of the information concerned. Such disclosure can take place by word of mouth, by printing, copying, e-mailing or creating documents and other data etc. The classification of the information should determine is confidentiality and hence the appropriate safeguards.
  4. Information Security Integrity Assurance that the information is authentic and complete. Ensuring that information can be relied upon to be sufficiently accurate for its purpose. The term Integrity is used frequently when considering Information Security as it is represents one of the primary indicators of security (or lack of it). The integrity of data is not only whether the data is 'correct', but whether it can be trusted and relied upon. For example, making copies (say by e-mailing a file) of a sensitive document, threatens both confidentiality and the integrity of the information. Why? Because, by making one or more copies, the data is then at risk of change or modification.
  5. Information Security Availability Assurance that the systems responsible for delivering, storing and processing information are accessible when needed, by those who need them.
  6. Confusion Information Security vs IT Security vs Data Security Information Security is: The terms information security, computer security and information assurance are frequently used interchangeably. These fields are interrelated often and share the common goals of protecting the confidentiality, integrity and availability of information; however, there are some subtle differences between them. These differences lie primarily in the approach to the subject, the methodologies used, and the areas of concentration. Information security is concerned with the confidentiality, integrity and availability of data regardless of the form the data may take: electronic, print, or other forms.
  7. Confusion Information Security vs IT Security vs Data Security IT (Information Technology) Security is: IT security is about protecting the integrity, accessibility, and reliability of electronic information and with the behaviors and actions of computer users as they impact the privacy and safety of all members of the Internet community. IT security works with physical security to ensure protection of information, whether electronic or hardcopy.
  8. Confusion Information Security vs IT Security vs Data Security Data Security is: In simple terms, data security is the practice of keeping data protected from corruption and unauthorized access. The focus behind data security is to ensure privacy while protecting personal or corporate data.
  9. Solution
  10. Security Tiers
  11. You Want More Talk to us at: Pg&Assocoates@stt.co.za +27 (0)12 346 0332
  12. Information Security Services 1. Physical Security 2. Network Security 3. Protocols / Services 4. User Security 5. Data Storage Security 6. Passwords 7. System Administration
Anzeige