information security

Good Essays
Information security

Information Security Attributes: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are composed in three main portions, hardware, software and communications with the purpose to help identify and apply information security industry standards, as mechanisms of protection and prevention, at three levels or layers: physical, personal and organizational. Essentially, procedures or policies are implemented to tell people (administrators, users and operators) how to use products to ensure information security within the organizations.
Information security, sometimes shortened to InfoSec, is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. It is a general term that can be used regardless of the form the data may take (electronic, physical, etc...)

Two major aspects of information security are:

IT security: Sometimes referred to as computer security, Information Technology Security is information security applied to technology (most often some form of computer system). It is worthwhile to note that a computer does not necessarily mean a home desktop. A computer is any device with a processor and some memory (even a calculator). IT security specialists are almost always found in any major enterprise/establishment due to the nature and value of the data within larger businesses. They are responsible for keeping all of the technology within the company secure from malicious cyber attacks that often attempt to breach into critical private information or gain control of the internal systems.
Information assurance: The act of ensuring that data is not lost when critical issues arise. These issues include but are not limited to: natural disasters, computer/server malfunction, physical theft, or any other instance where data has the potential of being lost. Since most information is stored on computers in

You May Also Find These Documents Helpful

  • Powerful Essays

    Information Security

    • 1955 Words
    • 8 Pages

    Information Security How to provide it? A Research Paper Presented to The faculty of the De La Salle Lipa In Partial fulfillment Of the requirements for the Course Communication Skills 2 By: John Michael T. Imperial King V. Benedicto ABSTRACT: This research paper provides information about information security. Information security is about protection of important files and data. It is about stopping hackers from breaching over your files and maintaining the…

    • 1955 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Information Security

    • 874 Words
    • 4 Pages

    (assuring the security of utility services) related to information security? Information security is the protection of information and it is critical elements, including the systems and hardware that used, store, and transmit that information, Thus, assuring the security of utility services are critical elements in information system. 4. What type of security was dominant in the early years of computing? The type of security was dominant in the early years of computing security was entirely physical…

    • 874 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    Information Security

    • 1359 Words
    • 4 Pages

    Information Security American Public University Professor Michael Brown August 10, 2012 One of the biggest issues in the Information Technology field these days is information security. Today almost anything can be found on the internet. Even like how to videos on how to put in a window, break-into a house, or even hack computers. The digital age has many perks but it also has many down falls to it as well. The perks that we enjoy so much from the internet also leaves us open to identity…

    • 1359 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Information Security

    • 813 Words
    • 4 Pages

    information security. 1. What do you understand by information security? Explain the CIA triad. Information security:is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction it has also be define as the protection of information systems against unauthorized access to or modification of information, whether in storage, processing or transit, and against the denial of service to authorized users or…

    • 813 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Information Security

    • 2381 Words
    • 10 Pages

    TRUST, SECURITY & PASSWORDS SURVEY JUNE 2012 ©2012 Cyber-Ark Software, Inc. | www.cyber-ark.com 2 Contents page Page 3 Pages 4 – 13 Executive Summary Key Report Findings  Page 4: Insiders Considered Greatest Organizational Security Threat  Page 5: Privileged Accounts Are Increasingly Targeted – Regardless of Attack Entry Point  Page 5: High Profile Security Incidents Impact Organizational Security Strategies  Page 6: Organizations are taking a broad approach to security in 2012…

    • 2381 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    Information Security

    • 23429 Words
    • 94 Pages

    today. They received a report on the expenses and lost production from the worm outbreak last month, and they directed us to improve the security of our technology. Gladys says you can help me understand what we need to do about it.” “To start with,” Charlie said, “instead of setting up a computer security solution, we need to develop an information security program. We need a thorough review of our policies and practices, and we need to establish an ongoing risk management program. There are…

    • 23429 Words
    • 94 Pages
    Powerful Essays
  • Powerful Essays

    Information Security

    • 2061 Words
    • 9 Pages

    PROTECTION OF INFORMATION Abstract: In this paper an overall study of information protection is presented. The state of information and its types also given, methods of computer information systems and its aspects and measures of information protection discussed. A state of art of the current malware and its evolution is carried out. Keywords: Information protection, information sources, computer crimes, hackers, malware INTRODUCTION Rapid development of automation…

    • 2061 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Information Security

    • 11954 Words
    • 48 Pages

    National Cyber Security Research Agenda — Trust and Security for our Digital Life — Version 1.2 Editors: dr.ir. Herbert Bos (Vrije Universiteit Amsterdam) prof.dr. Sandro Etalle (Technische Universiteit Eindhoven) dr.ir. Erik Poll (Radboud Universiteit Nijmegen) Contents 1 A National Research Agenda for Cyber Security 2 Focus and objectives 3 The many aspects of cyber security 4 Setting the research agenda 4.1 Contexts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .…

    • 11954 Words
    • 48 Pages
    Good Essays
  • Good Essays

    Information Security

    • 2188 Words
    • 9 Pages

    Characteristics of Information Security; The extended characteristics of information security as proposed by (Whitman, M.E. & Mattord, H.J, 2010) are planning, policy, programs, protection and project management. Being highly respectable experts in the field of information technology, specifically information systems and security, transfers credibility and authenticity to the anticipated theories. The six characteristics will now be explained. Planning; The planning stage in Information Security (InfoSec)…

    • 2188 Words
    • 9 Pages
    Good Essays
  • Good Essays

    Information Security

    • 1992 Words
    • 8 Pages

    4. Implementation 4.1 mobile website or application When we are planning to establish a mobile presence for PAAC one of the first considerations that will likely come to mind is whether we want to create a mobile application for users to download (app) or a mobile website, or perhaps both. Mobile websites and apps can look very similar at first-glance, and determining which is most suited to PAAC’s needs will depend upon a number of factors, including target audiences, available budget, intended…

    • 1992 Words
    • 8 Pages
    Good Essays