Cybersecurity versus Information Security

 

What is the big difference anyway?

Information and cybersecurity is very similar as they are both designed to protect the organizational security posture. A well-defined security structure and policy can protect the organization in the event of a data breach and recovery.

Information security (InfoSec) is the strategies and methodologies designed to manage the processes, tools, and policies needed to protect the confidentiality, integrity, and availability of information systems and data. The CIA (confidentiality, integrity, and availability) has become the mandatory foundation for the protection and preservation of security of an organizations data. The components of CIA are:

isometric 13

  • Confidentiality: ensures that sensitive information is only disclosed to authorized parties.

 

  • Integrity: prevents the modification of data in transit. It also maintains consistency, accuracy of data throughout its life-cycle.

 

  • Availability:  ensures that the data will be accessible to all parties when requested.

Cybersecurity is a subset of information security and is the practice and techniques utilized in the protection of the confidentiality, integrity, and availability of information system. The practices within this field ensures that servers, intranets, information systems, and any channel designed for data transits is protected and accessible. It also executes the needed practices to prevent organizations from digital attacks and or damages implemented by any other technologies or practices.

INFORMATION SECURITY

VERSUS

CYBERSECURITY

Information Security

Cybersecurity
Ensures that Information Security Awareness training is implemented within the needed policies and procedures. Utilizes detection software in order to ensure compliance with the organizations information security awareness policies and does not deal with security in paper form.
Protects data against threats. Deals with dangers revolving around cyberspace.
Protects against the unauthorized access, disclosure, use, modification, disruption, or destruction. Works to protect against cyber crimes, cyber fraud, and violations of cyber law

Lee Signore

 

 

 

Advertisements

Published by

Lee Signore

Lee has over 15 years of cybersecurity experience and holds a masters degree in cybersecurity along several industry certifications. Lee started Cyber Misfits blog as a way to collaborate with other cyber-minded folks. She loves sharing her knowledge and discussing all of the latest cybersecurity news.

This site uses Akismet to reduce spam. Learn how your comment data is processed.