Some Information Systems Security Terminologies

Cybersecurity:

The protection of information that is stored, transmitted, and processed in a networked system of computers, other digital devices, and network devices and transmission lines, including the Internet. Protection encompasses confidentiality, integrity, availability, authenticity, and accountability. Methods of protection include organizational policies and procedures, as well as technical means such as encryption and secure communications protocols.

Subsets of Cybersecurity

Information security: This term refers to the preservation of confidentiality, integrity, and availability of information.

Network security: This term refers to the protection of networks and their service from unauthorized modification, destruction, or disclosure, and the provision of assurance that the network performs its critical functions correctly and there are no harmful side effects.

Security Objectives

Cybersecurity definition introduces three key objectives that are at the heart of information and network security:

  • Confidentiality:

    Data confidentiality: Assures that private or confidential information is not made available or disclosed to unauthorized individuals.

    Privacy: Assures that individuals control or influence what information related to them may be collected and stored and by whom and to whom that information may be disclosed

  • Integrity:

    Data integrity: Assures that data (both stored and in transmitted packets) and programs are changed only in a specified and authorized manner

    System integrity: Assures that a system performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system

  • Availability:

    Assures that systems work promptly and service is not denied to authorized users. These three concepts form what is often referred to as the CIA triad

  • Confidentiality:

    Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information.

  • Integrity:

  • Guarding against improper information modification or destruction, including ensuring information nonrepudiation and authenticity.

    Availability:

  • Ensuring timely and reliable access to and use of information