Versions Compared
Key
- This line was added.
- This line was removed.
- Formatting was changed.
🎓 Purpose
As with any discipline or field, Information Security (often referred to as cyber security) has its own unique vocabulary. While this Handbook aims to provide cyber security resources in plain language, at times it is necessary to reference the underlying concept or simply there might not be an adequate synonym.
👥 Audience
Status | ||
---|---|---|
|
Status | ||||
---|---|---|---|---|
|
Status | ||||
---|---|---|---|---|
|
Status | ||||
---|---|---|---|---|
|
Status | ||||
---|---|---|---|---|
|
📑 Glossary
Table of Contents | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
A
Availability
Availability refers to ensuring that data is accessible and useable by authorized users when needed. Whether you are collaborating with colleagues across the University’s three campus or across the world, or perhaps just working remotely, not being able to access your data when you want to can reduce productivity, impact sponsor deadlines, or simply be a nuisance.
🛡️
C
CIA Triad
The CIA triad is a foundational model within Information Security which outlines three critical points of consideration—confidentiality, integrity, and availability—when it comes to efforts to protect information and digital assets, such administrative data or your research data and the systems they are stored on.
Confidentiality
Confidentiality refers to protecting data from access by or disclosure to unauthorized individuals or entities and is especially important for sensitive and non-public data. While your research results may often be made public through publication or other data sharing arrangements, confidentiality might be a necessary consideration during active research, particularly in the protection of intellectual property prior to its publication or patenting or as a requirement outlined by a partner or the research ethics boards.
🛡️
I
Integrity
Integrity refers to protecting data from unauthorized alteration or destruction. While this differs from scientific, research, or academic integrity, all speak to ways in which trust and confidence can be maintained, whether within the data itself or in the enterprises that produce it. The integrity of your research data is of significant importance, whether during active research, publication, or deposit, as alterations or destruction can result in data loss, time loss, or reputational harm.
🔍 Search
Live Search | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
|
✉️ Additional help
Expand | ||
---|---|---|
| ||
Expand | ||
---|---|---|
| ||
https://security.utoronto.ca/services/research-information-security-program/ |
\uD83D\uDCCB Related articles
Filter by label (Content by label) | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|
|