Four goals of security

Opinion

Four goals of security

Most people who have gone beyond the mistaken assumption that anti-virus equals the totality of information security will have found that the market is full of niche products offering solutions to specific threats.

The majority of small- and medium-sized businesses and almost all home users find using such tools too expensive and complicated to implement, so a very high percentage of computer users remains seriously exposed.

But it is amazing what gains in security can be achieved virtually free of charge by simply tightening up on the way we manage our computer systems.
The real basic goals of information security are

  • Confidentiality

  • Integrity

  • Availability

  • Non-repudiation. Accomplishing these is a management issue before it's a technical one, as they are essentially business objectives.


Confidentiality is about controlling access to files either in storage or in transit. This requires systems configuration or products (a technical job). But the critical definition of the parameters (who should be able to access what) is a business-related process.

Ensuring integrity is a matter of version control - making sure only the right people can change documents. It also requires an audit trail of the changes, and a fallback position in case changes prove detrimental. This meshes with non-repudiation (the change record must include who as well as what and when).

Availability is the Cinderella of information security as it is rarely discussed. But however safe from hackers your information is, it is no use if you can't get at it when you need to. So you need to think about data back-ups, bandwidth and standby facilities, which many people still leave out of their security planning.

Over the next few months I will be using this column in Computer Weekly to describe a range of ways to increase security by good housekeeping without spending lots of money.

Mike Barwise is an independent security consultant at Computer Security Awareness

Email Alerts

Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

This was first published in April 2002

 

COMMENTS powered by Disqus  //  Commenting policy