Scroll Top

What is Information Security?

The art of Securing Information in the entire organisation with the context of the Organisation is Information Security. Information may reside in the brain/memory of C-Suite or any employees who are the key stakeholders and not always in a digital form. However, with the growing evolution of Brain-Computer Interface Technologies, even humans will be connected to computers. InfoSec is a Superset of IT.
01
confidentialitY

Confidentiality ensures that the necessary level of secrecy is enforced at each terminal of data processing and prevents unapproved or unauthorised exposure.

02
integrity

Integrity is sustained when the assurance of the accuracy and reliability of information and systems is provided and any unapproved change is blocked.

03
availability

Availability protection ensures reliability and timely access to data and resources to approved individuals including insiders and outsiders.

04
non-repudiation

Nonrepudiation Ensures that a sender cannot deny sending a message. Mechanisms include encryption, digital signatures, and notarization.

elements of infosec
1. confidentiality.
2. Integrity.
3. availability.
4. Non-repudiation
  • Vulnerability Weakness or a lack of a countermeasure.
  • Threat agent Entity that can exploit a vulnerability.
  • Threat The danger of a threat agent exploiting a vulnerability.
  • Risk The probability of a threat agent exploiting a vulnerability and the associated impact.
  • Control Safeguard that is put in place to reduce risk, also called a countermeasure.
  • Exposure Presence of a vulnerability, which exposes the organisation to a threat.
  • Availability
    • Redundant array of inexpensive disks (RAID)
    • Clustering
    • Loadbalancing
    • Redundant data and power lines
    • Software and data backups
    • Disk shadowing
    • Co-location and off-site facilities
    • Roll-back functions
    • Fail-over configurations
  • Integrity
    • Hashing (data integrity)
    • Configuration management (system integrity)
    • Change control (process integrity)
    • Access control (physical and technical)
    • Software digital signing
    • Transmission CRC functions
  • Confidentiality
    • Encryption for data at rest (whole disk, database encryption)
    • Encryption for data in transit (IPSec, SSL, PPTP, SSH)
    • Access control (physical and technical)
  • Non-Repudiation
    • Mutual Non-Compete Non-Disclosure Agreements. 
    • Digitally Signed Agreements. 
01
threat

A threat is any potential danger that is associated with the exploitation of a vulnerability.

02
vulnerability

A vulnerability is a lack of a countermeasure or a weakness in a countermeasure that is in place.

03
exposure

Exposure is an occurrence of being exposed to losses. A vulnerability exposes an organisation.

04
risk

A risk is the likelihood of a threat agent exploiting a vulnerability and the corresponding business impact.

infosec

Key Important Aspects of Information Security.

  1. Elements of Information Security.
  2. Information Security Policies.
  3. Offensive Security (Branch of InfoSec).
  4. Information Security Frameworks.
  5. Information Security Governance.
  6. Information Risk Management.
information security risk assessment gains you build a cyber resilience
We perform a combo of both Qualitative and Quantitative Risk Assessment with our Expert Information Risk Management Practitioners. 
benefits of infosec

profit centre

  • Information Security is not a Cost Center. However, if you choose the right team then it is always a Profit Center.
  • Preventing Costly Data Breaches and ensuring Business Continuity is the major aspect of Information Security.
  • Having an Unbiased views about the Information Technology (IT) and IT Security are major goals.
  • Building a Cyber Security Maturity Model and providing Security Awareness throughout the organisation enabling all people plays a vital role in making the human firewall.
  • There is no patch to human stupidity. However, with proper Security Training and Security Policies the information risk will be mitigated.
Privacy Preferences
When you visit our website, it may store information through your browser from specific services, usually in form of cookies. Here you can change your privacy preferences. Please note that blocking some types of cookies may impact your experience on our website and the services we offer.