Day 3 – Knowing your information

Knowing your information

What elements make up information?

There are three main elements to consider when protecting information, these are:
     * Confidentiality – how sensitive the information is
     * Integrity – ensuring that the information isn’t changed
     * Availability – does the information always need to be available

What to keep in mind when thinking of protection.

Not all information requires the same level of protection in these terms.

For example, a paper based bank statement can be filed away when not required, reducing its availability and increasing its confidentiality. While it may be difficult to change printed text in a way that is not obvious, you could black out information using a permanent marker meaning that not all of it is available.

While working with documents both in the home and at work, you will be appraising what is an appropriate level of protection, probably without thinking about it. However, it is something that is really important as not all information carries the same value. This is crucial when picking which files or devices are to be encrypted. Encryption is simple to do and doesn’t have an impact on performance. It’s the best way of securing your data, more information on encryption can be found here.

The University has defined four categories of classification. Public, Standard, Confidential and Restricted.  They each have differing levels of protection that need to be applied to keep the information secure.

Understanding the value of information allows the correct protection to be applied. This will assist in keeping it secure.



For further information, come on down to the Infosec table

The location of our Infosec table is listed below. The table will be manned from 1pm ’til 2pm.

Wednesday – Plymouth University library, Main entrance
Thursday – Plymouth University library, Main entrance
Friday – Roland Levinsky Building, Ground Floor near the lecture theatres

Extra information and help

Plymouth University Information Security Classification



Leave a Reply

Your email address will not be published. Required fields are marked *