Introduction - Basics
Information security is not a matter of a one-time set-up or a single piece of software or hardware - but rather it is an ongoing process.
Therefore every user has to ask himself again and again:
- What would be the consequences if the data from this device were to fall into the hands of others, and what measures can I take to prevent this? (Confidentiality)
- What would be the consequences if important data on this device were to be altered, whether by malice aforethought or by technical errors, and what can I do about it? (Data Integrity)
- What would happen if this device suddenly failed and how can I prevent or mitigate the consequences? (Availability)
see also: https://en.wikipedia.org/wiki/Information_security