Layered Security

January 7, 2017 | Views: 4430

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATIONAlready a Member Login Here

 Security is an important matter in every domain. It stands for the act of “protecting” assets that have a significant value. This “protection” cannot be shortened into one simple definition, for it includes several aspects depending on the nature of the asset we want to protect and its specifications.

Nevertheless, this subject has been lately of great importance, more than ever. The reasons might be numerous, but the fact that this has turned into a trend have pushed a lot of people to try to learn the secrets of security and to dig deep into its philosophy and methodologies.

In this article (and hopefully the ones to come), I will try to introduce the security on information systems and information technology as a whole in order to get a glance about the importance and the criticality of such matter, and also to spot the light on some misunderstandings of the nuances between the information security as a whole and its components (network security …). This will serve as a ground base for me and the readers in order to discuss security matters and hopefully learn from each other and from other experts.  

For instance, there are mainly two types of assets in information systems: tangible and intangible assets. Tangible assets are physical assets such as machines, cables … We can easily distinguish them a simple rule: if you can touch it using your hands then it is tangible! Easy isn’t it?

If we understand tangible then we already know what intangible assets are. Any asset that is not physical is an intangible asset, but these assets might be a little tricky and not at the first sight: Information, data, software, licenses … and the list goes on! That being said, the security of information systems deals with both types of assets and has as the main goal to protect them from any form of violation, theft of misuse.

The question that pops into my mind at this stage is to know the difference between information systems security and networks security? Well, as I see it (hopefully I can get your opinions in the comments section to correct me if I am wrong) the two of them overlap to the point that it is very hard to distinguish between them or to treat one of them without having to deal with the other! The main principle of information security is to guarantee the confidentiality, integrity, and availability of the information, and once this information is stored or transported on a digital medium, then it has changed its nature at some point into a data that needs to be processed! Hence the overlapping between the two concepts.

This introduction will serve (as noted earlier) as a ground base to what will be coming. The final purpose is to introduce the philosophy of threating security using a layered approach (inspired from the famous defense in depth methodology), but the ultimate finality as I hope is to create an “Agora” where we can change ideas and learn from each other.

Share with Friends
FacebookTwitterLinkedInEmail
Use Cybytes and
Tip the Author!
Join
Share with Friends
FacebookTwitterLinkedInEmail
Ready to share your knowledge and expertise?
11 Comments
  1. Good opening, looking forward to the topic’s further discussion

  2. Looking forward to reading the next post.

  3. Nice one, looking forward to the next article.

  4. A Nice one! . Am curious to read on next article on layered security!!

  5. Interesting. Especially the way you made it easy to remember the Tangible and Intangible assets. Waiting for more. Keep ’em coming!

Page 2 of 2«12
Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel