What Is Security?

A social media account gets hijacked. Credit card details leak from an online shop. These kinds of incidents are in the news every week. "Security" — or information security — refers to all the practices that protect information from such accidents. In this article we break down the three pillars of security, the main threats, and what you can do to protect yourself, with diagrams.

So What Exactly Is Security?

Information security means protecting the data inside computers and smartphones from being read without permission, altered, or deleted. The professional world defines three pillars: Confidentiality, Integrity, and Availability. These terms sound fancy, but in plain language they just mean "can't be seen," "can't be tampered with," and "always accessible."

For example: keeping a DM with a friend private from strangers is Confidentiality; making sure a homework file can't be secretly edited is Integrity; making sure a school communication app opens when you need it is Availability. Security isn't just a concern for big companies — the moment you pick up a smartphone it becomes part of your everyday life.

The things worth protecting go beyond just passwords. Photos, location data, search history, game save data, conversations with friends, and school-issued accounts are all valuable information. Think about "what would hurt if stolen," "what you don't want others to see," and "what you can't afford to lose" — that shows you how broad security really is.

The Three Pillars of Information Security (CIA) — Examples & Impact If even one pillar fails, a security incident occurs Pillar Meaning Teen examples If it breaks C: Confidentiality Confidentiality "Can't be seen" Only authorized people can view the information Protected by passwords & encryption · Private DMs · Locked smartphone · Your search history · Grade data · Private messages leaked · Photos spread online · Used for impersonation · Used as blackmail I: Integrity Integrity "Can't be altered" Information cannot be modified without permission Detected via signatures & hashes · Submitted homework file · Bank transaction records · PDF contracts · Game save data · Grades tampered with · Balance zeroed out · Fake instructions injected · Progress deleted A: Availability Availability "Always accessible" Accessible when you need it Backups & redundancy · School messaging app · Streaming class video · SNS login · Cloud before an exam · Can't see announcements · Locked out of class · Miss a deadline · Can't retrieve data
Fig. 1: The three pillars of information security (CIA) with teen examples. All three must be in place before something can truly be called "secure."

The Main Threats

The security world calls risks "threats," and there are many kinds. The eight below are the ones individuals run into most often. Knowing their names and characteristics alone will help you understand the news much better.

Teens especially need to watch out for SNS account hijacking, gaming account theft, fake login pages, and scams disguised as free giveaways. Attackers don't rely on difficult hacking alone — they use psychology like "hurry," "limited time," and "your friends are doing it" to make you click.

In other words, security is a matter of judgment as much as technology. Check who sent the link before opening it, look at the URL on a login page, and if a weird notification pops up, screenshot it and ask an adult. These small habits prevent major trouble.

Cyber Threats in Japan — Types Most Common Among Teens Source: Japan's National Police Agency "Cyber Threats," IPA "Top 10 Information Security Threats" Threat type Approx. incidents/year (teens–20s) Main method Phishing Fake login pages ~120,000 cases Fake sites via SMS steal passwords SNS account hijacking Password reuse ~80,000 cases Leaked credentials reused elsewhere Gaming account fraud RMT, cheat tool sales, etc. ~50,000 cases Info leaked via third-party tools Impersonation / defamation Posting as someone else ~30,000 cases Leaked photos / info exploited Malicious apps / malware Installing sketchy apps ~20,000 cases Disguised as "free stickers" / "cheats" Illegal job scams via SNS High-pay recruitment lures ~10,000 cases Recruited into crime via DM ▶ Most common for teens: phishing, SNS hijacking, gaming account theft 80% of incidents can be prevented with: no password reuse · 2FA · don't click suspicious links
Fig. 2: Common cyber incidents in Japan. Phishing and SNS hijacking are concentrated among teens and young adults.

Pitfalls to Watch Out For

Three things to definitely avoid
  • Using the same password on multiple sites. If one leaks, all of them get compromised.
  • Clicking a suspicious link "just to check." If it feels wrong, close it immediately.
  • Ignoring OS and browser update notifications. Leaving old software unpatched is the most dangerous thing you can do.

How Will This Help My Future?

Security engineers are in chronic short supply worldwide and are among the highest-paid professionals in tech. The field requires not just technical skills but also knowledge of law, human psychology, and business judgment. It all starts with small curiosities — "Why is this connection encrypted?"

Even if you don't aim to become an engineer, these skills matter. Club-shared accounts, school-festival signup forms, helping family with their phone settings — people who can ask "is this safe?" in everyday situations become the go-to person everyone trusts. The ability to protect is just as foundational in IT as the ability to build.

What You Can Do Starting Today

Protect yourself in 3 steps
  1. Turn on two-factor authentication for major services (Google, X, LINE, school accounts).
  2. Set up a password manager (1Password, Bitwarden, etc.) and use a unique password for every site.
  3. Set a monthly reminder to check that your OS and browser are on the latest version.

Summary

Security means keeping information in a state where it "can't be seen, can't be altered, and is always accessible." Even if it sounds like advanced tech, just following three steps — two-factor authentication, password management, and OS updates — makes it much easier to avoid most incidents. Finishing those three things today is the most important first move you can make.