Please enable JavaScript.
Coggle requires JavaScript to display documents.
Cybersecurity Principles, Practices and Process, image, image, image,…
Cybersecurity Principles, Practices and Process
The Cybersecurity Cube
They are divided in a cube that will be Security Principle,Data States, Safe Guards
-
Data Integrity
Integrity is the accuracy, consistency, and trustworthiness of data across its entire lifecycle.
Data undergoes several operations, such as capture, storage, retrieval, update, and transfer. Data must remain unaltered by unauthorized entities during all these operations.
Methods used to ensure data integrity include hashing, data validation checks, data consistency checks, and access controls. Data integrity systems can include one or more of these methods.
Availability
Availability refers to the need to maintain availability of information whenever it is needed. Cyberattacks and system failures can prevent access to information, systems and services.
Ensuring Availability
Equipment Maintence, Backup Testing, Disaaster Planning, New technologies implementation, Activity Monitoration, Activity Testing
States of Data
Data at Rest
‘Data at rest’ refers to data that is in storage. Simply put, it is the state data is in when no user or process is accessing, requesting or amending it. Data at rest can be stored on local devices such as a hard disk in a user’s computer, or centralized on a network, such as an organization’s server.
-
-
-
-
-
-
-