Professional Documents
Culture Documents
In his talk, I have learned that information security refers to the processes which
are designed and implemented to protect print, electronic, or any other form of
confidential data. The CIA Triad includes preserving authorized restrictions on access
and disclosure, guarding against improper information modification, and ensuring timely
and reliable access to use of information. The key elements of information security are
the people, process, and technology. The people include training, awareness, mobile
computing, social networking, and performance mitigation. The process includes risk
other hand, the technology includes system security, UTM firewalls, and managed
services.
In his talk, I have learned that information security refers to the processes which
are designed and implemented to protect print, electronic, or any other form of
confidential data. The CIA Triad includes preserving authorized restrictions on access
and disclosure, guarding against improper information modification, and ensuring timely
and reliable access to use of information. The key elements of information security are
the people, process, and technology. The people include training, awareness, mobile
computing, social networking, and performance mitigation. The process includes risk
other hand, the technology includes system security, UTM firewalls, and managed
services.