Understanding in depth the security of information is vital in the paradigm in which today’s society is, which increasingly focuses on sharing data and storing it digitally. Taking this into account, it is essential to start by indicating that information security is a different term from computer security, although there is no doubt that both are intertwined in a very personal way. The main reason for this difference is that information security encompasses more dimensions than purely information, reaching a global importance in other aspects that may or may not be related to cybersecurity. Knowing this, let’s focus on this case and review the four key properties that presents the information security:
It is easy to understand that confidentiality is the parameter that leads to certain information only reaches the hands and knowledge of who is or is authorized to know. This type of philosophy applies to all areas and is a parameter that has accompanied the information security throughout history since such importance be extended decades ago during encoding transmissions in World War II between The different armies.
Confidentiality is created by the efforts made at the least one of the two parties involved in a process to share information. If there is a guy who gets access to that information for much that is not authorized, you could say that confidentiality was violated at some point. This applies in many cases, as when a customer buys a product in a shop online using a credit card. The whole process is protected confidential and no one should access that information, but in specific cases may occur. This we understand to computer and digital level, but are there other cases that can break the confidentiality of a process? Examples are substantial:
Someone publishes private information publicly without the authorization of the affected person
An individual looks at another by entering the security number of their mobile or credit card
Access to a company’s hard drives with confidential information about it
Disseminate private information even after signing a confidentiality agreement
This defends characteristic which information must remain true to how it was conceived at the time unless authorized for modification.If a book remains intact over the years and with multiple translations into several languages without changing the content or the essence of it, it can be said that its integrity has been respected. If a document is modified by altering data without authorization or program or any other media, in this case it will have violated the integrity of the same. Promoting integrity is possible to guarantee the value of the information transmitted.
In computer and digital sector it is very easy to understand the objective of the parameter availability. It refers to the need for information, files or programs remain available at all times no matter what happens. They must be supportive measures and security, well-established channels that allow information to be processed at the time which is necessary and that no interruptions in services. When a system guarantees its customers responsible and the availability of a service or information, which is also doing is to avoid risky situations and exposed to attacks.
With the latter the information security is concerned to ensure that parties involved in the process of sharing data and other elements are correct. Identify users both side of the shipment as other surprises and ensures that risks are avoided. The sender authentication ensure that information is a specific person who receives another without that there can be a third individual who is trying to take advantage of a moment of confusion. All this applies in cybersecurity to the need to establish user accounts so firmly protected with passwords.