Information security systems (INFOSEC)

Keep the information confidential

  • Interestingly, even kids know this. When a child whispers some information in his/her friends ears, both of them very well know that it has to be kept secret.
  • Whether the information is related to the computer systems, information technology, information and communication technology, or a simple means of communication, the first element is maintaining the confidentiality of the matter.
  • The International Organization of Standardization has regarded confidentiality, or secrecy, to be the key element of information security. ISO clearly states ensuring that information is accessible only to those authorized to have access is the basis of maintaining secrecy about any information.

Maintaining honesty

  • Integrity in information security is related to data integrity.
  • This concept of data integrity is closely relevant to telecommunications. Computer Science also has data integrity, as a core element, to protect its information database.
  • In fact, data integrity is to maintain the accuracy of the data while its in operation, storage and more importantly when it is being transferred. Most illegal steps and cyber crimes take place during the transfer process. Therefore, if the basic honesty in data integrity is violated, information security cannot be sustained.
  • Integrity of information shares a close relationship with the data preservation. Specifications of data users ought to be maintained for the security of information.

Ease of use

  • With secrecy and integrity, the factor availability is also required to maintain the security of information.
  • Now, availability does not mean that any data or documentation is free to be accessed. The specifications of accessing any type of information is coded and hence made available. In this way availability becomes an integral factor of information security.
  • Relating to the field of telecommunications, availability has a direct connection with a time-frame. Got it? Actually when it comes to maintenance of secrecy, or being concerned with the security of information, no operational function in the telecommunications field can be made available at all times. Thus, the condition of functionality can be otherwise stated as availability of the information.