There Are Only Two People in The World I Trust-You & Me, and I'm Not So Sure About you-SHON HARRIS
There Are Only Two People in The World I Trust-You & Me, and I'm Not So Sure About you-SHON HARRIS
The most common ways we protect Data against loss of confidentiality is with
access controls and encryption.
For securing Integrity the most prominent method used is by Hashing using an
hash algorithm.
Some methods that organizations use to protect against loss of availability are
fault tolerant systems, redundancies, and backups. Fault tolerance means that
a system can develop a fault, yet tolerate it and continue to operate.
Availability is how robustly data is available for authorised people to access it.
Authenticate-Pin,Password
The CIA triad is the principle or standard that forms the basis for all security
architecture.
CIA of data or information becomes all the more important when many of our
business/payment transactions happen online.
After deciding the levels of CIA proper policies, guidelines ,standards and
procedures are to be laid out for a business. The fundamental characteristic of
an Information Security Policy is identifying major functional areas of
information and classifying them according to the required levels of
security.Once policies are framed it is mandatory to get them endorsed by the
senior management. Active participation and Commitment from the senior
management will establish a sense of ownership for security.
Some of the standards like the ISO/IEC 27000 Series can set the Information
Security Policy for the organisation.
The ISO/IEC 27000 Series is based on the following stages of implementation:
This is just one method that gives us a set of standards to build a security
program with and serves as industry best practices for IS management within
the Organisation.