Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction.
The terms information security, computer security and information assurance are frequently used interchangeably. These fields are interrelated often and share the common goals of protecting the confidentiality, integrity and availability of information; however, there are some subtle differences between them.
These differences lie primarily in the approach to the subject, the methodologies used, and the areas of concentration. Information security is concerned with the confidentiality, integrity and availability of data regardless of the form the data may take: electronic, print, or other forms. Computer security can focus on ensuring the availability and correct operation of a computer system without concern for the information stored or processed by the computer. Information assurance focuses on the reasons for assurance that information is protected, and is thus reasoning about information security.
Governments, military, corporations, financial institutions, hospitals, and private businesses amass a great deal of confidential information about their employees, customers, products, research, and financial status. Most of this information is now collected, processed and stored on electronic computers and transmitted across networks to other computers.
Should confidential information about a business' customers or finances or new product line fall into the hands of a competitor, such a breach of security could lead to negative consequences. Protecting confidential information is a business requirement, and in many cases also an ethical and legal requirement.
For the individual, information security has a significant effect on privacy, which is viewed very differently in different cultures.
The field of information security has grown and evolved significantly in recent years. There are many ways of gaining entry into the field as a career. It offers many areas for specialization including: securing network(s) and allied infrastructure, securing applications and databases, security testing, information systems auditing, business continuity planning and digital forensics science, etc.
This article presents a general overview of information security and its core concepts.
Other articles related to "information, security, information security":
... and Associate Dean at Idaho State University, director of the National Information Assurance Training and Education Center (NIATEC) and the Simplot Decision Support Center (SDSC), and for ten years the chair ... for selecting, recommending and implementing security policy and procedures ... However, few schools were offering information security curricula, much less academic degrees, and organizations would have to take an IT professional at his or her word ...
... After the turn of the century SafeNet took a driving role in the information security market consolidation and acquired multiple companies in the following years, most notable acquisition being Rainbow Technologies, a ... became the world’s seventh largest information security company and tripled its revenue ... family of products complements SafeNet's security solutions to ensure that enterprise and government organizations are compliant and limit liabilities ...
... Information security is the ongoing process of exercising due care and due diligence to protect information, and information systems, from unauthorized ... The never ending process of information security involves ongoing training, assessment, protection, monitoring detection, incident response repair, documentation, and review ... This makes information security an indispensable part of all the business operations across different domains ...
... INCA Internet is one of the leading information security companies of the Republic of Korea and the line of products is branded 'nProtect' ... The main business areas of INCA Internet include online PC security services for financial institutions, internet business corporations, and online game ... Application Service Provider (ASP) companies in the online PC security industry ...
... Numerous information security standards promote good security practices and define frameworks or systems to structure the analysis and design for managing information security ...
Famous quotes containing the words security and/or information:
“Is a Bill of Rights a security for [religious liberty]? If there were but one sect in America, a Bill of Rights would be a small protection for liberty.... Freedom derives from a multiplicity of sects, which pervade America, and which is the best and only security for religious liberty in any society. For where there is such a variety of sects, there cannot be a majority of any one sect to oppress and persecute the rest.”
—James Madison (17511836)
“As information technology restructures the work situation, it abstracts thought from action.”
—Shoshana Zuboff (b. 1951)