Workplace Deviance

The information security triad involves confidentiality, integrity, and availability. Confidentiality involves the limiting access to information to those who need to know or have specific privileges to view it. Integrity within the security triad relates to ensuring the data access by those who availability to is not altered or misrepresented. Lastly, we have availability which means all the information users have access to is available when they need to use it. Authentication the action of identifying users before they obtain access to the information or systems available to them. Multi-factor authentication involves the use of one or more factors to identify someone using something they have, know, or are. This term refers to what capabilities and access a user is assign which is determined by their role as a user. The purpose of encryption is to ensure the proper users are accesses information that is being transferred or stored. During this process the sender encrypts the plain text and the recipient receives the cipher text and decodes it. Pretexting is described as attackers calling a company’s help desk or security team to gain access or information through pretending to be an authorized user. This can be a major liability for a company due to the attacker being successful and accessing information or system they otherwise would not have had access to leading to compromised information or systems. Backups are essential to have to keep company data safe and available when a crisis happens affecting system data. It is important to backup data regularly, use different locations, and test data restoration tactics to confirm it will be successful Firewalls protect company devices from outside threats by detecting packets and stopping those which do not meet specific sets of criteria. Two types of firewalls are software base and hardware based. Physical security involves the use of good cybersecurity hygiene. This means locking computers before walking away, locking up equipment or servers, and training employees to use good judgement when storing and using devices outside of the office.

Leave a Reply

Your email address will not be published. Required fields are marked *