You are on page 1of 1

What have you learned?

In his talk, I have learned that information security refers to the processes which

are designed and implemented to protect print, electronic, or any other form of

confidential data. The CIA Triad includes preserving authorized restrictions on access

and disclosure, guarding against improper information modification, and ensuring timely

and reliable access to use of information. The key elements of information security are

the people, process, and technology. The people include training, awareness, mobile

computing, social networking, and performance mitigation. The process includes risk

management, data classification, access management, and incident response. On the

other hand, the technology includes system security, UTM firewalls, and managed

services.

In his talk, I have learned that information security refers to the processes which

are designed and implemented to protect print, electronic, or any other form of

confidential data. The CIA Triad includes preserving authorized restrictions on access

and disclosure, guarding against improper information modification, and ensuring timely

and reliable access to use of information. The key elements of information security are

the people, process, and technology. The people include training, awareness, mobile

computing, social networking, and performance mitigation. The process includes risk

management, data classification, access management, and incident response. On the

other hand, the technology includes system security, UTM firewalls, and managed

services.

You might also like