Information Security - Lexicon (1/3)
Saurabh Prakash Gupta
Tech Lead Enthusiast | Cyber Security | Strategy | Consulting | CISSP | CCSP | CISM | ISO 27001 LA | GCIH
“Information,?knowledge,?wisdom?are terms for human acquirements through reading, study, and practical experience” as defined at www.dictionary.com. With the ever connected 'information enabled' cyber-world today, a new paradigm of human acquirement from 'DATA' may be appended to the above mentioned definition.
"Security" may be considered as "The quality or state of being free from danger"
By mentioning the generic definitions, I intend to clarify that information is not limited to transaction only on computers/ electronic hardware. Every experience which we have in life is 'information'. Information is exchanged by us continuously and is essential for taking decisions. 'Informed Decisions' lead to success and 'uninformed/ mal-informed' decisions generally lead to failures. And, therefore, we, the humanity, all of us are information security practitioners on a daily basis!
To cite a few relatable examples, 'gossip' is the human method of information leak!, trying to avoid letting a third person know about the happenings within a family is information security and keeping the TV switched off during children's exams may be considered a kind of DoS (Denial of Service) attack (we are denying the availability of TV service, an information source, to the children)!
Few foundational concepts around 'information' are:
In my next few articles, I intend to present frequently used Cyber-security jargon through relatable daily life experiences for a better understanding by the uninitiated but interested individuals to the field of information security. I hope it will help many understand the basic concepts and encourage them to explore more.
To begin with let me take the terms associated with the commonly discussed "CIA Triad" viz. 'Confidentiality', 'Integrity' and 'Availability'.
CONFIDENTIALITY : "Security of information from unauthorised disclosure".
领英推荐
INTEGRITY : "Whole/ Complete/ Uncorrupted". The piece of information has remained as it was created.
AVAILABILITY : Information is available to whom it is authorised/ intended, when it is required, in a format (language) understandable by the authorised user.
I hope the examples elucidated above are easier to comprehend and make the concept of the key terms clear. Please add similar examples in the comments and do let me know any suggestions for improvement/ any particular terms you would like to see explained!
*Next up: Threat, Risk and Vulnerability
CISO and Data Protection Officer at Birlasoft
2 年Good one Saurabh. Very easy to relate examples.??
Location Head(BGSW), Cybersecurity Practice Head, EU Horizon Projects Lead, CISSP, Mgr.
2 年Good start Sir....would like to know your views on Defence in Depth.
Security Auditor @ CBA || Ex-Military || OSCP || GSEC || CompTIA Sec+ || ISMS LA
2 年Short and sweet read sir
L&T Head Combat System, IIM Mumbai||Strategic & Operations || Ex- Submarine Captain||Data Analytics|| AI&ML||Project Management||
2 年Aptly summarised
Product Management | Salesforce Leader | Fintech Evangelist | MBA
2 年Very insightful! Indeed infosec is a critical part of software development and needs to be involved at the very beginning. Thank you Cdr Saurabh Prakash Gupta