Core goals of information security

Hello CINners,

This question may seem a little broad, but I'm going to ask
it anyway, to see what kind of responses it pulls in.

Question: What are the three core goals of information security?

I'll provide my answer on eve of the next calendar holiday, or on
the day of.
In the words of Cobra Kai
- Strike First
- Strike Hard
- No Mercy

/r
 
In the words of Cobra Kai
- Strike First
- Strike Hard
- No Mercy

/r
For starters, can you imagine my face being as red as that emoji :)

Thank you for your response to my query. I'm going to take
advantage of those 3 core goals that you provided to respond
to your submission:

How appropos is the first item, because your response is the first
response to my query:

I'm going to Strike this first response, and I'm going to Strike it Hard,
and I'm going to do both with absolutely NO MERCY!!!!

CINners, for your benefit, Mr. Butler's three core goals in information security are:
Wrong! Wrong!! Wrong!!!
 
Hello CINners,

This question may seem a little broad, but I'm going to ask
it anyway, to see what kind of responses it pulls in.

Question: What are the three core goals of information security?

I'll provide my answer on eve of the next calendar holiday, or on
the day of.
The everlasting question that keeps all info sec pros up at night!

1. Cry (when the system fails).
2. Improvise (when the documentation is outdated).
3.Never Sleep (because threats never do).

Or, as more serious folks might say, 'Confidentiality, Integrity, Availability'- but where’s the fun in that? 😊
Can’t wait for the official response on the holiday!
 
  • Love
Reactions: Trevor Chandler
The everlasting question that keeps all info sec pros up at night!

1. Cry (when the system fails).
2. Improvise (when the documentation is outdated).
3.Never Sleep (because threats never do).

Or, as more serious folks might say, 'Confidentiality, Integrity, Availability'- but where’s the fun in that? 😊
Can’t wait for the official response on the holiday!
I do love this response! Thanks precious!!!
 
  • Like
Reactions: precious
For starters, can you imagine my face being as red as that emoji :)

Thank you for your response to my query. I'm going to take
advantage of those 3 core goals that you provided to respond
to your submission:

How appropos is the first item, because your response is the first
response to my query:

I'm going to Strike this first response, and I'm going to Strike it Hard,
and I'm going to do both with absolutely NO MERCY!!!!

CINners, for your benefit, Mr. Butler's three core goals in information security are:
Wrong! Wrong!! Wrong!!!
Anyone on the Red Team side of things would probably agree with me far more than you'd care to admit, Mr. Chandler.

/r
 
  • Like
Reactions: precious
Hello CINners,

This question may seem a little broad, but I'm going to ask
it anyway, to see what kind of responses it pulls in.

Question: What are the three core goals of information security?

I'll provide my answer on eve of the next calendar holiday, or on
the day of.
1. Do everything possible to secure you data and information at rest state or in transit.
2. Provide tools to monitor any unauthorized user that was to access your information.
3. Proper education to the employee or those that have access to the information about cyber crime.
 
  • Like
Reactions: precious
Thank you my friend
Also data in use
Data in use is inherently vulnerable because it's actively being processed by a system, making it difficult to encrypt without disrupting operations.
Say you are supplying an https login, it means your credentials are not encrypted, here TLS cannot save you if one captured those login credentials in RAM since data is in use.