0% found this document useful (0 votes)
11 views1 page

Module 1

Uploaded by

deer
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views1 page

Module 1

Uploaded by

deer
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

Introduction to Ethical Hacking

Elements of Information Security


- Information security is “the state of the well-being of information and infrastructure in which the possibility
of theft, tampering, or disruption of information and services is kept low or tolerable.”
- It relies on five major elements:
confidentiality,
integrity,
availability,
authenticity, and
non-repudiation.

Confidentiality
- Confidentiality is the assurance that the information is accessible only to authorized.
- Confidentiality breaches may occur due to improper data handling or a hacking attempt.
- Confidentiality controls include data classification, data encryption, and proper disposal of equipment.

Integrity
- Integrity is the trustworthiness of data or resources in the prevention of improper and unauthorized
changes—the assurance that information is sufficiently accurate for its purpose.
- Measures to maintain data integrity may include a checksum (a number produced by a mathematical
function to verify that a given block of data is not changed) and access control (which ensures that only
authorized people can update, add, or delete data).

Availability
- Availability is the assurance that the systems responsible for delivering, storing, and
processing information are accessible when required by authorized users.
- Measures to maintain data availability can include disk arrays for redundant systems and clustered
machines, antivirus software to combat malware, and distributed denial-of-service (DDoS) prevention
systems.

Authenticity
- Authenticity refers to the characteristic of communication, documents, or any data that ensures the
quality of being genuine or uncorrupted.
- The major role of authentication is to confirm that a user is genuine.
- Controls such as biometrics, smart cards, and digital certificates ensure the authenticity of data,
transactions, communications, and documents.

Non-Repudiation
- Non-repudiation is a way to guarantee that the sender of a message cannot later deny having sent the
message and that the recipient cannot deny having received the message.
- Individuals and organizations use digital signatures to ensure non-repudiation.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy