Difference between Information Security, IT Security, Cybersecurity

Information Security : Includes all type of info and knowledge such as documents or voice info

IT Security : info regarding the hardware and software such as servers and networks

Cybersecurity : Every type of info that you can access using the internet


CIA Triad : Confidentiality , Integrity , Availability

Confidentiality

Protects sensitive information from unauthorized access through encryption, access controls, and secure practices.

3 States of data:

  1. Data at rest: Data stored on devices like hard drives or databases, protected by encryption and access controls.
  2. Data in motion: Data transmitted over networks, secured using encryption protocols like TLS/SSL.
  3. Data in use: Data actively processed by applications, safeguarded through secure coding practices and runtime protection mechanisms.

Integrity (connected in TIGHT with Confidentiality)

Ensures data remains accurate and unaltered, using checksums, digital signatures, and access controls to prevent unauthorized changes.

Availability

Guarantees that systems and data are accessible to authorized users when needed, through redundancy, failover mechanisms, and robust infrastructure.

Resume-producing event

is an accomplishment or experience that significantly enhances one's qualifications and is worth highlighting on a resume. (IT CAN BE GOOD OR BAD but mostly BAD)


DAD : Disclosure, Alteration, Destruction