Arcane Cyber on Facebook
Arcane Cyber on Twitter
  • contact@arcanecyber.net
  • (703) 755-0812
Arcane CyberArcane Cyber
  • Home
  • What We Do
  • Solutions
    • Commitment
    • Port Logic
  • Support & Services
    • Cyber Risk Assessment
    • Security Program and Policy Development
    • Managed Security Services
    • Security Awareness Training
    • Vulnerability Assessment and Remediation
    • Incident Response Management
  • Resources
    • Blog
    • Cybersecurity Resources for Any Sized Businesses
    • Alerts & Warnings
    • Cyber Threats – Visualizing the Landscape
  • Let’s Talk

Information Security

Information security is a set of practices intended to keep data secure from unauthorized access or alterations. Often referred to as InfoSec and data security; information security is a specific discipline under the cybersecurity umbrella focused on protecting data. The basic components of information security are most often summed up by the so-called CIA triad: confidentiality, integrity, and availability.

Data confidentiality is maintained when only those people who are authorized to access the information is allowed and unauthorized access is prevented.

Information integrity prevents data from being improperly modified, either by accident or maliciously. When data integrity is held, the information is non-reputable, which ensures that the authenticity cannot be challenged.

Availability is a contrast of confidentiality. While access to data must prevent unauthorized users, availability ensures that data can be accessed by those who have are permitted.

Information and data security balances the CIA triad to ensure access to the data run or manage the business.

Cybersecurity Strategy and Cyber Risk
Computer Security

Is Your Cybersecurity Strategy Up to Date?

What a historic year 2020 turned out to be.  With a raging pandemic, good-ole American ingenuity saw companies large and small revolutionizing ways of doing business.  Although remote worker technology has been around for years, transforming on such a massive scale also had an unintended consequence; an increase in business Read more…

By arcanecyber, 2 yearsJanuary 18, 2021 ago
Ransomware and Data Protection
Computer Security

E-3-2-1 Data Protection Strategy, It’s Time for an Evolution

E-3-2-1 Data Protection Strategy is my proposal in the evolutionary cyber arms race between the cyber security community and cyber criminals. Every once in a while, an evolution in adversarial thinking forces cyber security experts to reconsider and update a successful data protection strategy. With the introduction of Maze Ransomware, Read more…

By arcanecyber, 2 yearsDecember 31, 2020 ago
Arcane Cyber
Search Categories
  • Computer Security (2)
  • Cyber Risk (1)
  • Cybersecurity (2)
  • Cybersecurity Strategy (1)
  • Information Security (2)
US CERT Threat Feed
Tweets by @USCERT_gov
  • Let’s Talk
  • What We Do
  • Solutions
  • Support & Services
  • Privacy Policy

© Copyright 2022, Arcane Cyber, LLC