Cybersecurity and information security are often used interchangeably, but they do have some distinct differences.
Cybersecurity is the practice of protecting computers, networks, and devices from digital attacks, theft, and damage. It involves the use of technical measures, such as firewalls and antivirus software, as well as policies and procedures, to prevent unauthorized access to or misuse of information and systems.
Information security, on the other hand, is the practice of protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. It involves the use of technical, physical, and administrative measures to ensure the confidentiality, integrity, and availability(CIA) of information and systems.
In short, cybersecurity is focused on protecting against attacks and threats that target computer systems and networks, while information security is focused on protecting the confidentiality, integrity, and availability of information and information systems.
Both cybersecurity and information security are important for organizations, as they help to protect against a wide range of threats, including data breaches, malware attacks, and ransomware attacks. Implementing strong cybersecurity and information security measures can help to protect against these threats and ensure the confidentiality, integrity, and availability of sensitive information and systems.
What is CIA?
Confidentiality: Only authorized users and processes should be able to access or modify the data
Integrity: Data should be maintained in a correct state, and nobody should be able to improperly modify it, either accidentally or maliciously
Availability: Authorized users should be able to access data whenever they need to do so
An example of the CIA triad in practice
Think of logging into an e-commerce site to check your orders and make an additional purpose. The e-commerce site uses the three principles of the CIA triad in the following ways:
Confidentiality: When you log in, you’re asked for a password. If it’s been a while since your last log-in, you may be asked to input a code that’s been sent to you or some other form of two-factor authentication.
Integrity: Data integrity is provided by making sure your purchases are reflected in your account and allowing you to contact a representative if there’s a discrepancy.
Availability: You can log into your account whenever you want, and you may even be able to contact customer support at any time of the day or night.
Non-repudiation:
Method by which the sender of data is provided with a proof of delivery and the recipient is assured of the sender’s identity (ID), so that neither can later deny having processed the data.
User authentication methods:
The main factors used in user authentication include the following:
- Knowledge: In the knowledge-based authentication method, the user is authenticated based on what the user knows. For example, it could be a PIN, password, or maybe a secret key that is required to access the online account.
What the user knows—knowledge-based authentication (e.g., password, PIN, passcode)
Possession: In the possession-based authentication method, the user is authenticated based on what the user has. For example, it could be a device (smartphone, tablet, or computer), token, or a smart card.
What the user has—possession-based authentication (e.g., memory card and smart card tokens)
Inherence/Biometric: In the inherence-based authentication method, the user is authenticated based on what the user is. For example, biometric elements such as voice patterns, face biometrics, fingerprints, etc.
What the user is—biometric-based authentication: physiological (e.g., fingerprint) or behavioral (e.g., keyboard dynamics) characteristics
Identification, authentication, authorization, and accountability are four important concepts in information security.
- Identification: This refers to the process of identifying an individual or device in order to determine their identity. This can be done through the use of user accounts, passwords, and other types of credentials.
- Authentication: This refers to the process of verifying the identity of an individual or device. This can be done through the use of passwords, security tokens, biometric authentication, or other types of authentication methods.
- Authorization: This refers to the process of granting access to resources or privileges to an individual or device based on their identity and permissions. This can be done through the use of user accounts, permissions, and access controls.
- Accountability: This refers to the ability to trace actions or events back to an individual or device. This is important in order to ensure that individuals or devices are held accountable for their actions and that any security incidents can be properly investigated and resolved.