🛡️

Basics of Information Security

Nov 9, 2025

Overview

  • Key concepts and question-answer summaries unit-wise for the CW3551 Data and Information Security course.
  • Explanation of important components, techniques, and implemented procedures in Information Security.

Key Components of Information Security (CIA Triad)

  • Confidentiality: Protecting information secretly to prevent unauthorized access.
  • Integrity: Maintaining accuracy and consistency of data; preventing unauthorized modifications.
  • Availability: Ensuring that authorized users can access information when needed.

Confidentiality

  • Using security methods to prevent information from reaching third parties.
  • Encryption: Converting readable data into an unreadable form.
  • Access Control: Setting controls such as passwords and biometric systems.
  • Data Masking: Applying protective layers over sensitive data.

Integrity

  • Ensuring data is correct, stable, and trustworthy.
  • Hashing: Creating a fixed-size hash value from data.
  • Digital Signature: Using a digital key to verify authenticity.
  • Checksums: Periodically verifying data correctness.

Availability

  • Redundancy: Creating backup copies to handle data loss.
  • Disaster Recovery: Plans to restore services and data after major disruptions.
  • Load Balancing: Distributing load to ensure continuous service availability.

Authentication

  • Verifying whether a user/device/system is legitimate.
  • Using Passwords, Security Tokens, Biometrics, Multi-factor Authentication.

Authorization

  • Granting permissions on who can access or operate what.
  • Using Role-Based Access Control (RBAC), Attribute-Based Access Control (ABAC), Discretionary Access Control.

Non-Repudiation

  • Providing evidence so that a doer cannot deny their action later.
  • Implemented through Digital Signatures and Audit Trails.

Accountability & Auditing

  • Clearly defining responsibilities and monitoring them.
  • Evaluation through Logging, Monitoring, SIEM, and Regular Audits.

Risk Management

  • Identify: Detecting information security risks.
  • Assess: Evaluating risk levels and prioritizing.
  • Mitigate: Implementing controls to reduce risks.
  • Business Continuity Planning: Developing plans for ongoing operations.

Incident Response

  • Prepare: Ready preventive plans, responsibilities, and tools.
  • Identify: Recognize, analyze, and record incidents.
  • Eradicate: Remove causes and clean the environment.
  • Recover: Restore services and data to normal.
  • Lessons Learned: Improve based on experiences.

Physical Security

  • Implementing controls like CCTV, Biometric, Face Recognition.
  • Maintaining access doors, security procedures, and monitoring systems.

Security Awareness & Training

  • Informing users about best practices.
  • Training against Phishing, Weak Passwords, Social Engineering.
  • Conducting Phishing Simulations, sharing Best Practices, and Regular Security Updates.

Key Components – Summary Table

ComponentPurposeMain Techniques/Tools
ConfidentialityPrevent unauthorized accessEncryption, Access Control, Data Masking
IntegrityData accuracy and consistencyHashing, Digital Signature, Checksums
AvailabilityAccessible when neededRedundancy, Disaster Recovery, Load Balancing
AuthenticationUser/device identity verificationPassword, Token, Biometric, MFA
AuthorizationAccess permission controlRBAC, ABAC, DAC
Non-RepudiationPrevent denial of actionsDigital Signature, Audit Trail
Accountability & AuditingResponsibility and monitoringLogging, Monitoring, SIEM, Audits
Risk ManagementRisk reductionRisk Assessment, Mitigation, BCP
Incident ResponseIncident handlingPrepare, Identify, Eradicate, Recover, Lessons
Physical SecurityPhysical level protectionCCTV, Biometric, Face Recognition
Security AwarenessUser awarenessPhishing Simulation, Best Practices, Updates

Key Terms & Definitions

  • CIA Triad: Core security objectives of Confidentiality, Integrity, Availability.
  • Encryption: Converting data into an unreadable coded form.
  • Hashing: Creating a fixed-size compressed value for a given input.
  • Digital Signature: Verifies sender authenticity and integrity.
  • RBAC/ABAC/DAC: Access control based on role, attribute, or individual discretion.
  • SIEM: Security Information and Event Management system.

Action Items / Next Steps

  • Review definitions and examples of CIA, AuthN/AuthZ, Non-Repudiation.
  • Summarize and practice Hashing, Digital Signature, Backup/Disaster Recovery procedures.
  • Create and share a list of phishing simulations and best practices with the team.