Cybersecurity - The power of information
- david11-15
- May 19, 2024
- 2 min read
Every day we talk about cybersecurity, penetration testing, SIEM, SOC and a world of technologies and rules that tend to overwhelm everyone, so going back to basics will always be an option to know what to protect and what is important will help to facilitate our day to day cybersecurity, therefore there are concepts that will help us to know how to stay protected.
What is information?
We can consider the information as a set of data, on the other hand is the core the center of the companies, customers, invoices, documents, recipes is the most valuable thing that companies have therefore is the target of cybercriminals and is also the main objective of our protection, how to protect it will be the focus of this entry.
CIA Triangle - Today a Pentagon
Many of us have heard of the CIA triangle which refers to 3 important and crucial items to keep our information secure which are:
Confidentiality: Data is accessible only by authorized users and processes.
Integrity: Data will only be modified for purposes that are not malicious or illegitimate.
Availability: Any authorized user or process must have the data available whenever they need it.
But everything evolves and it is time to take into account other points to protect our information, our triangle is no longer enough, it is time for the pentagon.
Pentagon CIA ? - CIAAN

Nowadays with the new technologies and AI we cannot trust all the information and this is also part of the day to day in security so due to all the changes two new points to take into account that evolve our triangle in a pentagon are born.
Authenticity: It must be guaranteed that the information is genuine.
Non-Repudation: It is the guarantee that the sender of a message cannot later deny having sent the message and that the recipient cannot deny having received the message.
Information is power
As we observed in this post the information day by day is more important and therefore its protection is priority, we must take into account that this can be manipulated, rejected and more therefore if we take into account what we have learned here we will know where to take measures and protect it from external agents.


Comments