Information Security
Introduction
Computer security, also known as cybersecurity,[1] is the area related to computing and telematics that focuses on the protection of computing infrastructure and everything linked to it, and especially the information contained in a computer or circulating through computer networks.[2] For this there are a series of standards, protocols, methods, rules, tools, and laws designed to minimize possible risks to the infrastructure or to the information itself. Cybersecurity includes software (databases, metadata, "Archive (computing)" files), hardware, computer networks, and everything that the organization understands and values as a risk if the confidential information involved could reach the hands of other people, for example, thus becoming privileged information.
The definition of information security should not be confused with that of "computer security", the latter only deals with security in the computer environment, but by the way, information can be found in different media or forms, and not exclusively in computer media.
Information security tells us about methods and processes that seek to protect information files in their different forms and states, while computer security tells us about technical methods and processes for protecting the confidentiality, availability and integrity of the information.
Computer security also refers to the practice of preventing malicious attacks on computers and servers, mobile devices, electronic systems, networks and data, etc.[1].
In short, security in a network environment is the ability to identify and eliminate vulnerabilities. A general definition of security must also pay attention to the need to safeguard organizational advantage, including information and physical equipment, such as computers themselves. No one in charge of security should determine who and when can take appropriate actions on a specific item. When it comes to company security, what is appropriate varies from organization to organization. Regardless, any company with a network should have a security policy that addresses convenience and coordination.
In the field of cybersecurity, risk assessment models have been developed to effectively manage aspects related to cyber risk. One of these models is the "McCumber cube" introduced by John McCumber in 1991. The McCumber cube is a three-dimensional model used to analyze and design information security strategies comprehensively. This revolutionary model described cybersecurity risk factors in a three-dimensional, cube-like representation. Each of the visible faces of the cube represents three different aspects of cyber risk that must be managed effectively. Each intersection in the three-dimensional space of the cube represents the combination of three components, one from each face. That is, each junction point in the cube represents the intersection of three key aspects related to cyber risk. In particular, the mini-cube located on the front and outlined in red represents the intersection of confidentiality, technology and processing. This approach highlights the idea of implementing technological controls to safeguard data privacy during processing. The McCumber Cube model has been used as a valuable tool in cybersecurity risk assessment and management, allowing organizations to more effectively identify and address vulnerabilities and threats in their digital environment.