Cyber Security ResourceCyber Security Resource
  • Home
  • Products
    • Complete Guide To Infosec Book
    • Step by Step Infosec Program Development Course
  • Services
    • IT Security Partnership Program
    • Security Risk Assessment
    • Vulnerability Assessment
    • Penetration Test
    • Security Program Development
  • Solutions
    • Free CyberSecurity Community Membership
    • Information Security Program
    • Enterprise Risk Management
    • Vulnerability Management
    • Incident Response
  • Contact Us
  • Blog
  • Members
Facebook
Twitter
LinkedIn

Data Security

Home Data Security
Cyber Data Protection

Data Security

Information and records (data) should be managed consistent with the organization’s risk strategy to protect the confidentiality, integrity, and availability of information.

Confidentiality

In information security, confidentiality “is the property, that information is not made available or disclosed to unauthorized individuals, entities, or processes” (Excerpt ISO27000).

Integrity

In information security, data integrity means maintaining and assuring the accuracy and completeness of data over its entire life-cycle. This means that data cannot be modified in an unauthorized or undetected manner. Information security systems typically provide message integrity in addition to data confidentiality.

Availability

High availability systems aim to remain available at all times, preventing service disruptions due to power outages, hardware failures, and system upgrades. Ensuring availability also involves preventing denial-of-service attacks, such as a flood of incoming messages to the target system essentially forcing it to shut down.

What Does This Mean?

1: Data-at-rest is protected
2: Data-in-transit is protected
3: Assets are formally managed during removal, transfers, & disposition
4: Adequate capacity to ensure availability is maintained
5: Protections against data leaks are implemented
6: Integrity checking mechanisms are used to verify software, firmware, and information integrity
7: The DEV and TST environment(s) are separate from PROD.

Quick Link

  • Risk Management
  • Information Security
  • Vulnerability Management
  • Incident Response

Join Our Community

Center for Internet Security

Its mission is to identify, develop, validate, promote, and sustain best practice solutions for cyber defense.

Recommend Solutions

Whatever your company is most known for should go right here, whether that’s bratwurst or baseball caps or vampire bat removal.

Recommend Solutions

Whatever your company is most known for should go right here, whether that’s bratwurst or baseball caps or vampire bat removal.

Program Implementation Support

Are you looking for a partner to help develop industry best practices into your security program?Leading security professionals with the experience and professionalism you desire are at your fingertips.

Contact us today and let us know how we can be of service!

Contact Us
HomeShop NowContact Us