Products
▸
Information security in the broadest sense is a combination of means to protect information from accidental or deliberate exposure. The owner of the information bears losses regardless of whether the impact was caused by natural or artificial factors.
Integrity means the capability of data to keep the original form and structure during storing and after repeated transfers. Only the owner or user with legal access to the data has the right to edit, delete or supplement the information.
Confidentiality reveals the need to restrict access to information resources for a certain circle of people. During actions and operations, information is only accessible to users who are included in the information systems and have been successfully authenticated.
Accessibility means that public information should be made available to authorized users of resources in a timely and unhindered manner.
Authenticity shows that the information belongs to a trusted person or owner who at the same time acts as a source of information.
Provision and sustainment of information security involves a set of various measures to prevent, monitor and eliminate unauthorized third-party access. Information security measures are also aimed at protection from damaging, distorting, blocking or copying information. All tasks should be addressed simultaneously, only then complete and reliable protection is ensured.
Keep corporate data safe with a free trial!
Main questions about the information protection method are especially acute when hacking or theft with distortion of information lead to severe consequences or financial damages.
There is the following logical chain of information transformation created with modeling:
Information threat is a potentially possible influence or impact on an automated system with the subsequent damage to someone's needs.
To date, there exist more than one hundred positions and types of threats to the information system. It is extremely important to analyze all risks using different diagnostic techniques. Based on the analyzed detailed indicators, you can competently build a system of protection against threats in the information space.
Information security threats are not manifested independently but through possible contact with the gaps in the protection system, or factors of vulnerability. The threat leads to the disruption in systems on a specific carrier.
The main vulnerabilities are caused by the following factors:
Most often the sources of threats are triggered in order to obtain illegal benefits after damaging information. However, accidental effect of threats due to insufficient protection and mass attack of a threatening factor is also possible.
Vulnerabilities can be:
If you eliminate or at least mitigate the impact from vulnerabilities, you can avoid a significant threat meant to damage the storage system.
These factors vary depending on unforeseen circumstances and features of the information environment. They are almost impossible to predict in the information space, but you have to be prepared to rapidly eliminate them. Engineering and technical investigation or a response attack will help to mitigate the following problems:
1. System failures:
2. Factors weakening information security:
They depend on the technical design of the equipment which is installed on the object requiring protection, as well as its characteristics. It is impossible to escape all these factors, but their partial elimination can be achieved through engineering techniques in the following cases:
1. Related to emission technical means:
2. Activated:
3. Due to the characteristics of a protected object:
4. Those that depend on the characteristics of carriers:
In most cases, the vulnerabilities of this subtype result from inadequate employee actions at the level of storage and protection system development. Eliminating such factors is possible using hardware and software:
1. Inaccuracies and gross errors that violate information security:
2. System malfunctions in the information environment:
Specialists should consider and evaluate each vulnerability. Therefore, it is important to determine the criteria for assessing the threat of damage to the protection and the probability of its breakage or bypassing. The indicators are calculated with the use of ranking. There are three main criteria:
To find out the accurate information about protection level, you need to engage the analytical department. They will evaluate all the vulnerabilities and will make an information map with five point grading scale. The 1 corresponds to the minimal impact on the protection and its bypassing while the 5 corresponds to the maximum impact and, accordingly, the danger. The results are recorded in one table, and the impact level is broken down into categories for convenient calculation of the vulnerability factor.
Threats bypassing the protection of information security can be divided into several categories. The concept of categories is mandatory, since it simplifies and systematizes all factors without exception. The main parameters are
1. The degree of intentionality of intervention in the information protection system:
2. Signs of occurrence:
3. Classification of the immediate cause of the threat. The perpetrator can be:
4. Severity of threats on information resources:
DETECT INTERNAL SECURITY THREATS
There is another classification of IS threats. It is based on other parameters and is also used during the analysis of the system malfunction or hacking. The following is taken into account:
Threat source status:
Impact degree:
Severity and manifestations of a damage can be different:
The person who committed the offense (received unauthorized access to information, or hacked into the protection system) can cause damage. Damage can also occur regardless of the subject owning information, but because of external factors and impacts (technological and natural disasters). In the first case, the responsibility falls on the subject, the components of the crime are defined, and offenders are punished through judicial proceedings. An act can be committed:
The punishment for an offense is chosen according to the current national legislation or according to the criminal code in the first case. If the crime is committed through negligence, and the damage incurred is small, the case will be under civil, administrative or arbitration law.