What is information security, Computer Network Security

What is information security

Information security protects information (and facilities and systems which store, use and transmit it) from a broad range of threats, in order to preserve the value of it to an organization.

The definition stated above of information security is adapted from that of American National Security Telecommunications and Information Systems Security Committee (NSTISSC).

There are two significant characteristics of information which determine its value to an organization:

•The scarcity of information outside the organization;

•The shareability of information within the organization.

Simplifying, these characteristics state that information is valuable if it provides advantage those who have it, compared with those who do not.Therefore the value of any piece of information relates to the levels of shareability and scarcity. The goal of information security is to preserve the value of information by ensuring that these levels are correctly identified and preserved.

Threats to information influence the organization’s ability to share it within, or to preserve its scarcity outside. Furthermore, threats that are carried out can cost millions in compensation and reputation, and can jeopardize an institution’s ability to survive. Here are some of the examples in which the making available of information that should have been kept scarce or the restricting of information that should have been shareable has damaged an organization.

Posted Date: 10/8/2012 4:32:22 AM | Location : United States







Related Discussions:- What is information security, Assignment Help, Ask Question on What is information security, Get Answer, Expert's Help, What is information security Discussions

Write discussion on What is information security
Your posts are moderated
Related Questions
Deploying Host-Based IDSs -Proper implementation of HIDSs can be painstaking and time-consuming task .The process of deployment begins with implementing most critical systems fi

Question: (a) Distinguish between a mobile agent "state" and "code". (b) Differentiate between "weak" and "strong" mobility. (c) Mobile agent systems are known to have

(a) Illustrate what you understand by Nyquist Capacity Theorem? (b) Consider we wish to transmit at a rate of 64 kbps over a 4 kHz noisy but error-free channel. What is the mini

What questions should Iris ask Charlie about the new job, about Kelvin''s team, and about the future of the company?

The best results obtained in the PIIT classes have been when the technique has been used in tutorial groups, rather than have students submit individual reflections on particular c

What is information Information comprises the meanings and interpretations which people place upon the facts, or data. The value of information springs from the ways it can be i

i have an idea of clustering in wsns . where each and every sensor node use the reputation scheme and while clustering provide help against the selfishness atatck of the sensor nod

STAR TOPOLOGY In this topology, all devices are attached to a central point, which is sometimes known as the "Hub" as given in the diagram below.   Figure: An ideal

Consider the details of the X.509 certificate shown below. a. Identify the key elements in this certificate, including the owner''s name and public key, its validity dates, the nam

what is hacking