0% found this document useful (0 votes)
22 views

Information Security, Sometimes Shortened To Infosec, Is The Practice of Protecting

Information security involves protecting information by reducing risks of unauthorized access, use, disclosure, disruption or destruction of information. It focuses on maintaining the confidentiality, integrity and availability of data through a structured risk management process of identifying threats, evaluating risks, deciding how to address risks, selecting controls, and monitoring activities. Academics and professionals collaborate to standardize the discipline through guidance, policies and standards related to passwords, antivirus software, firewalls and more.

Uploaded by

nnpollwaththage
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views

Information Security, Sometimes Shortened To Infosec, Is The Practice of Protecting

Information security involves protecting information by reducing risks of unauthorized access, use, disclosure, disruption or destruction of information. It focuses on maintaining the confidentiality, integrity and availability of data through a structured risk management process of identifying threats, evaluating risks, deciding how to address risks, selecting controls, and monitoring activities. Academics and professionals collaborate to standardize the discipline through guidance, policies and standards related to passwords, antivirus software, firewalls and more.

Uploaded by

nnpollwaththage
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

Information security, sometimes shortened to infosec, is the practice of protecting information by

mitigating information risks. It is part of information risk management. It typically involves preventing
or at least reducing the probability of unauthorized/inappropriate access, use, disclosure, disruption,
deletion/destruction, corruption, modification, inspection, recording or devaluation, although it may
also involve reducing the adverse impacts of incidents. Information may take any form, e.g.
electronic or physical.,[1] tangible (e.g. paperwork) or intangible (e.g. knowledge). Information
security's primary focus is the balanced protection of the confidentiality, integrity and availability of
data (also known as the CIA triad) while maintaining a focus on efficient policy implementation, all
without hampering organization productivity.[2] This is largely achieved through a structured risk
management process that involves:

 Identifying information and related assets, plus potential threats, vulnerabilities and impacts;
 Evaluating the risks;
 Deciding how to address or treat the risks i.e. to avoid, mitigate, share or accept them;
 Where risk mitigation is required, selecting or designing appropriate security controls and
implementing them;
 Monitoring the activities, making adjustments as necessary to address any issues, changes and
improvement opportunities.
To standardize this discipline, academics and professionals collaborate to offer guidance, policies,
and industry standards on password, antivirus software, firewall, encryption software, legal liability,
security awareness and training, and so forth.[3] This standardization may be further driven by a wide
variety of laws and regulations that affect how data is accessed, processed, stored, transferred and
destroyed. However, the implementation of any standards and guidance within an entity may have
limited effect if a culture of continual improvement isn't adopted.[4]

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy