Frequently Asked Questions (FAQ)

Use the following questions and answers to learn more about information security and training at Cybersoft . If you don’t see your question or would like some clarification, contact info@cybersofttechnologies.com .


What is information security?

Information security is the practice of protecting information and information systems from unauthorized disclosure, modification, and destruction. It encompasses the security of all IT resources, including both privacy information and the IT devices that access, process, store, or transmit it.


What is an IT device?

An IT device is any device that is used to access, process, store, or transmit information and uses IT infrastructure, including the network. Examples of IT devices include desktop computers, laptop computers, smartphones, tablets, network devices, and printers.


What is integrity?

Integrity is the protection against improper modification or destruction of information. It includes non-repudiation and authenticity.
Integrity has to do with the accuracy of information, including its authenticity and trustworthiness. Information with low integrity concerns may be considered unimportant to precise activities or not necessary to vigorously check for errors. Information with high integrity concerns is considered critical and must be accurate in order to prevent negative impact on activities.
Integrity concerns—along with availability concerns—contribute to data’s criticality.


What is confidentiality?

Confidentiality is the preservation of authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information.
Confidentiality has to do with the privacy of information, including authorizations to view, share, and use it. Information with low confidentiality concerns may be considered “public” or otherwise not threatening if exposed beyond its intended audience. Information with high confidentiality concerns is considered secret and must be kept confidential to prevent identity theft, compromise of accounts and systems, legal or reputational damage, and other severe consequences.


What is availability?

Availability is the timeliness and reliability of access to and use of information.
Availability has to do with the accessibility and continuity of information. Information with low availability concerns may be considered supplementary rather than necessary. Information with high availability concerns is considered critical and must be accessible in order to prevent negative impact on activities.
Availability concerns—along with integrity concerns—contribute to data’s criticality.