Category Archives: digital forensics

Understanding the Primary Goals of Information Security

secure4The primary goal of information security is to secure digital content. Each kind of policy framed to secure information ought to highlight detection, prevention as well as response. Putting in place a foolproof system keeps you from having to deal with data recovery matters time and again.

Prevention refers to the channel via which professionals within the security industry employ for blocking intruders from gaining access into restricted networks. In its general context, this term refers to disallowing someone from entering into a given site. It means stopping a person from penetrating a secure facility or system.

Detection means having the ability of identifying activities as they take place. To succeed with this objective, it is important to monitor events very closely. This makes it possible to halt someone if something goes wrong.



Response touches on the procedures and methodologies put in place to mitigate acts of intrusion. The kind of response taken should be commensurate to the incident that is happening. You may discover that an individual pings your site in order to test its vulnerable points. Such activity does not require any reporting to authorities. You would have already detected the attempt then identified the source along with its IP address, before verifying it against your database and determining it as non-malicious.



Corporate policies addressing matters like these need to be established well and effectively put into operation. That said if that same individual kept relentlessly pinging your site, it might be necessary to take more radical action.

Attaining good information security should be the priority of each security and help desk professional tasked to protect your company or public sector network of government. Once this system is well-set, securing information becomes a natural affair. Lax implementation of policies relating to data protection could have devastating effect upon the business prospects of an organization.


Knowing what requires protection and how to go about it are the main keys to realizing the goals of information security. Absolute security is an illusion as the system may be intruded by a hacker who has sufficient tools, skills, time and motivation to do breach it. Confidentiality, availability and integrity are three important goals to evaluate and enforce in this case. Confidentiality refers to preventing unauthorized access, whereas integrity implies keeping data in unchanged and pure state. Availability means retaining data for authorized usage.



Use the strategy of defence in depth by applying layered security measures. This ensures than an additional protection measure is present in case on fails. People have a tendency of making the worst security decisions when left independent. Examples to this effect include taking the easy option and falling for scams.

Computer security is dependent upon the two important requirements of functionality and assurance. Functional requirements pertain to what a particular system should do. Assurance requirements express how a functional requirement ought to get tested and implemented.

General information security is difficult to enhance through obscurity. This approach employs hiding of security-mechanism details as a way of securing the system. The main challenge here is that the entire system gets compromised if a secret is let out. However, it takes a massive security apparatus in order to fully secure your information system.

If you’re looking for one of the online security sites then look no further than they are one of the leading IT security companies in the world and offer many services such as data recovery, digital forensics and the best security and consulting training available.   You can read more about them here or why not read their feature packed blog which is full of extensive industry information such as when storage media fails.

If you have any questions at all then please feel free to get in touch with one of team here who will be more than happy to help with any questions you may have. If social media is your thing then you can also get in touch with them on Google+ or Twitter.