Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Standard view
Full view
of .
Look up keyword or section
Like this

Table Of Contents

0 of .
Results for:
No results containing your search query
P. 1
Information Security

Information Security

Ratings: (0)|Views: 795|Likes:
Published by Manish Madhav

More info:

Published by: Manish Madhav on May 03, 2011
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less





Information security
means protecting information and information systems fromunauthorized access, use, disclosure, disruption, modification or destruction.The terms information security, computer security and information assurance arefrequently incorrectly used interchangeably. These fields are interrelated often andshare the common goals of protecting the confidentiality, integrity and availability of information; however, there are some subtle differences between them.These differences lie primarily in the approach to the subject, the methodologies used,and the areas of concentration. Information security is concerned with theconfidentiality, integrity and availability of data regardless of the form the data maytake: electronic, print, or other forms.Computer security can focus on ensuring the availability and correct operation of acomputer system without concern for the information stored or processed by thecomputer.Governments, military, corporations, financial institutions, hospitals, and private business amass a great deal of confidential information about their employees,customers, products, research, and financial status. Most of this information is nowcollected, processed and stored on electronic computers and transmitted acrossnetworks to other computers.Should confidential information about a business' customers or finances or new product line fall into the hands of a competitor, such a breach of security could lead tolost business, law suits or even bankruptcy of the business. Protecting confidentialinformation is a business requirement, and in many cases also an ethical and legalrequirement.For the individual, information security has a significant effect on privacy, which isviewed very differently in different cultures.The field of information security has grown and evolved significantly in recent years.As a career choice there are many ways of gaining entry into the field. It offers manyareas for specialization including: securing network(s) and allied infrastructure,securing applications and databases, security testing, information systems auditing, business continuity planning and digital forensics science, to name a few, which arecarried out by Information Security Consultants.This article presents a general overview of information security and its core concepts.
Information Security C
Availability (CIA). Infor hardware, software andinformation security indusat three levels or laye procedures or policies aoperators) how to useorganizations.
: or qualities, i.e., Confidentialitation Systems are decomposed in threecommunications with the purpose to identry standards, as mechanisms of protectionrs: Physical, Personal and Organizatione implemented to tell people (administra products to ensure information securi2, Integrity andmain portions,tify and applynd prevention,l. Essentially,ors, users andy within the
Since the early days of writing, heads of state and military commanders understoodthat it was necessary to provide some mechanism to protect the confidentiality of written correspondence and to have some means of detecting tampering.Julius Caesar is credited with the invention of the Caesar cipher c50 B.C., which wascreated in order to prevent his secret messages from being, read should a message fallinto the wrong hands.World War II brought about much advancement in information security and markedthe beginning of the professional field of information security.The end of the 20th century and early years of the 21st century saw rapidadvancements in telecommunications, computing hardware and software, and dataencryption. The availability of smaller, more powerful and less expensive computingequipment made electronic data processing within the reach of small business and thehome user. These computers quickly became interconnected through a network generically called the Internet or World Wide Web.The rapid growth and widespread use of electronic data processing and electronic business conducted through the Internet, along with numerous occurrences of international terrorism, fuelled the need for better methods of protecting thecomputers and the information they store, process and transmit. The academicdisciplines of computer security, information security and information assuranceemerged along with numerous professional organizations - all sharing the commongoals of ensuring the security and reliability of information systems.

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->