I am a highly skilled and experienced administrator with a strong background in both Windows and Linux systems. I have a deep understanding of network infrastructure, security, and system administration, and am able to effectively troubleshoot and resolve a wide range of technical issues. I am also well-versed in various scripting languages, including PowerShell and Bash, and am able to automate repetitive tasks and improve system efficiency.

Full width home advertisement

Post Page Advertisement [Top]

                                Elements of Information Security

Confidentiality
We want to make sure that our secret and sensitive data is secure.
Confidentiality means that only authorized persons can work with and see our
infrastructure’s digital resources. It also implies that unauthorized persons
should not have any access to the data. There are two types of data in general:
data in motion as it moves across the network and data at rest, when data is in
any media storage (such as servers, local hard drives, cloud). For data in
motion, we need to make sure data encryption before sending it over the
network. Another option we can use along with encryption is to use a
separate network for sensitive data. For data at rest, we can apply encryption
at storage media drive so that no one can read it in case of theft.
Integrity
We do not want our data to be accessible or manipulated by unauthorized
persons. Data integrity ensures that only authorized parties can modify data.
Availability
Availability applies to systems and data. If authorized persons cannot get the
data due to general network failure or denial-of-service(DOS) attack, then
that is the problem as long as the business is concerned. It may also result in
loss of revenues or recording some important results.

No comments:

Post a Comment

Bottom Ad [Post Page]