Environments involving electronic devices are exposed to various threats including unauthorized access, information leaks and data falsification.
Similarly, this system handles data for which there is a risk of security-related issues.
To avoid such risk, it is important to put in place safety measures from the perspective of information security.
The aim of security is to maintain information confidentiality, integrity, and availability.
The system is equipped with various functions for ensuring these three requirements.
This section describes these 3 requirements with along with examples of countermeasures.
Aims to ensure that only permitted users may access information. Using encryption and setting restrictions on accessing data also helps to improve confidentiality.
etc.
Aims to ensure a state in which information is not tampered with, and that information remains accurate and complete.
etc.
Aims to ensure a state in which the necessary people can access the necessary information when needed.
For example, losing access to your data due to a system failure means that availability cannot be maintained.
etc.