PCs ENVIRONMENT and PERIPHERALS Lecture 9 Information Security: What is it ? - Information security means protecting information and information systems from unauthorized access, use, modification or destruction. Information Security: * Information security, computer security and information assurance:- These fields are interrelated often and share the common goal of protecting the confidentiality , integrity and availability of information. - However, there are some differences between them. - The differences in the methodologies used and the areas of concentration. Information Security: 1- Information security: - Is concerned with the confidentiality, integrity and availability of data regardless of the form, the data may take: Electronic, print or other form. Information Security: 2-Computer security : - Computer security can focus on ensuring the availability and correct operation of a computer system without concern for the information stored or processed by the computer. Information Security: 3- information assurance: - Focus on how to ensure the data and managing risks related to the use, processing, storage, and transmission of information or data and the systems used for those purposes. Key concepts: CIA : - For over twenty years, information security has held that Confidentiality, Integrity and Availability(known as CIA Triad) as the core principles of information security. 1- Confidentiality: - is the term used to prevent the disclosure of information to unauthorized individuals or systems. - Breaches of confidentiality : - Many forms : 1- Permitting someone to look at your computer screen when your confidential data displayed on it could be a breach of confidentiality. 1- Confidentiality: 2- if a computer or laptop computer containing sensitive information and a company’s employees is stolen or sold it could result in a breach of confidentiality. 2- Integrity: - In information security, integrity means that data cannot be modified without authorization. - Many ways may violated integrity by malicious intent or without malicious intent. 2- Integrity: - Malicious intent : 1- an employee deletes important data files with malicious intent. 2- when a computer virus infect a computer. 3- when an employee is able to modify his own salary in a payroll database. 2- Integrity: - Without malicious intent: 1- an employee accidentally or without malicious intent deletes important data files. 2- The user forgets to type some information. 3- If a database update in a wrong way. 3- Availability: - For any information system, the information must be available when it is needed. Availability is violated : - When a user forget a username or password. - Hardware failures(by any reason).