Blog | G5 Cyber Security

Data Security: Authenticity, Confidentiality & Integrity

TL;DR

This guide explains how to ensure your data is genuine (authenticity), kept private (confidentiality) and hasn’t been tampered with (integrity). We’ll cover practical steps for individuals and small businesses.

Understanding the Concepts

1. Authenticity – Verifying the Source

  1. Email Verification: Don’t trust emails blindly. Check the sender’s address carefully. Look for misspellings or unusual domains.
    • Hover over links before clicking to see where they *really* lead.
    • Be wary of requests for personal information via email.
  2. Digital Signatures: For important documents, use digital signatures. These act like a fingerprint, proving the sender’s identity.
    openssl dgst -sha256 file.txt

    (This example shows how to create a SHA256 hash – a basic step in verifying data integrity and authenticity.)

  3. Website Certificates (HTTPS): Always look for “https://” at the beginning of website addresses, and a padlock icon. This means the connection is encrypted.
    • Click the padlock to view certificate details and confirm the website’s identity.

2. Confidentiality – Keeping Data Private

  1. Strong Passwords: Use long, complex passwords (at least 12 characters) with a mix of letters, numbers and symbols.
    • Use a password manager to generate and store strong passwords securely.
  2. Encryption: Protect sensitive data by encrypting it. This scrambles the information so only authorised people can read it.
    • File Encryption: Use tools like VeraCrypt or BitLocker to encrypt individual files or folders.
    • Disk Encryption: Encrypt your entire hard drive for maximum protection.
    • Email Encryption: Consider using PGP (Pretty Good Privacy) for secure email communication.
  3. Access Control: Limit who can access sensitive data.
    • Use user accounts with different permission levels.
    • Regularly review and update access permissions.

3. Integrity – Ensuring Data Accuracy

  1. Hashing: Create a hash (a unique fingerprint) of your data. If the data changes, the hash will change too.
    sha256sum file.txt

    (This command calculates the SHA256 hash of a file.)

  2. Regular Backups: Regularly back up your important data to a separate location (e.g., external hard drive, cloud storage).
    • Test your backups regularly to make sure they work correctly.
  3. Version Control: For documents and code, use version control systems like Git.
    git commit -m "Updated file"

    (This command saves a snapshot of your changes in Git.)

  4. Data Validation: Implement checks to ensure data is entered correctly. For example:
    • Use input masks for phone numbers and dates.
    • Check for valid email addresses.

4. cyber security Best Practices

  1. Keep Software Updated: Regularly update your operating system, browsers, and other software to patch security vulnerabilities.
  2. Firewall: Use a firewall to block unauthorised access to your computer or network.
  3. Antivirus/Anti-malware: Install and regularly scan with antivirus and anti-malware software.
Exit mobile version