IT Security Engineer
Experienced
What we do
The CIA triad, the model for information security that uses three principles for data security:
ConfidentialityOnly authorized users can access or modify data. Including keeping data secret or private, controlling access to information, and preventing unauthorized sharing of data.
IntegrityData should be authentic, and any attempts to alter it must be detectable. This make data trustworthy and free from tampering, maintain the authenticity, accuracy, and reliability of data.
AvailabilityAuthorized access to data whenever needed.
Don’t you just love people that call themselves “experts” at one thing or another. Well, I've been in IT since 1981, and I'm still no expert. And, with the rapid pace of technology change, and nowadays with Advanced Intelligence (the real definition of A.I.) keeping pace is difficult.
The best people at information management, like me, know the best approach is to dig, dig, dig, and then dig deeper. Leaving no stone unturned is the essential art for solving information management challenges.