1#Confidentiality
The first term of data security is known as confidentiality,
which is concerned with who could access or view the data. In addition, the data
will appear only for one or group of people who have the privilege to discover
that information. Whereas unauthorized people will not be able to access
information due to privileges. In certain security environments, all individuals
have one level of access to viewing data, whereas there is no need to
discriminate between users to separate or isolate the information. In other
instances, there are multiple layers of confidentiality, which hierarchical
security schemes are required to apply to the individual or groups. Each level
has a certain class to access data. In some instances, some that do not need to
apply confidentiality are "unclassified".However, there is data considered
secret or top-secret, each class requires a specific privilege to access.
2#Integrity
The second term of data security is known as Integrity. In the
previous term, we talk only about accessing data or viewing data and users can
only explore the data without any modification on it. Integrity has the same
functionality as confidentiality, but accessible users could make modifications
to that data either by addition or deleting, or moving the data. The Integrity
will ensure that data correctness and accuracy by blocking unauthorized
individuals to do any kind of modification. There are a number of tools that
protect organizations or systems from being attacked from inside or outside that
premises. such as using firewall devices, human monitoring the network for
suspicious activity, and Access Control list privileges. Data integrity is the
concept of ensuring that the data is not being tampered with or damaged by
mistake or intentionally. Each accessible user has certain privileges to make
modifications, but when that happens, it will register on the log file with an
indication of the name or id of the user that made that modification.
3#Availability
The third term of data security is known as availability. the
availability allows that authorized users to access data whenever they want and
ensure that data are reachable. Which takes care of physical and data impacts.
That physical impact such as ensuring that the power is available to that system
all day considering that backup power and other physical impacts are natural
disasters such as earthquakes, hurricanes, etc. In the case of physical impacts,
selecting the location of data centers is very important. In the case of data
impacts, the most familiar terms in this section are called redundant networks
or data. Redundant networks are focused on preparing alternative paths to access
data in case of access to the main path is a failure, where the switching is done
automatically. Whereas, the redundant database concentrates on providing an
extra one or more databases to back up the main one. The Availability is to
ensure that data or apps will be available and ready for users whenever.



Comments
Post a Comment