What is information security, Computer Network Security

What is information security

Information security protects information (and facilities and systems which store, use and transmit it) from a broad range of threats, in order to preserve the value of it to an organization.

The definition stated above of information security is adapted from that of American National Security Telecommunications and Information Systems Security Committee (NSTISSC).

There are two significant characteristics of information which determine its value to an organization:

•The scarcity of information outside the organization;

•The shareability of information within the organization.

Simplifying, these characteristics state that information is valuable if it provides advantage those who have it, compared with those who do not.Therefore the value of any piece of information relates to the levels of shareability and scarcity. The goal of information security is to preserve the value of information by ensuring that these levels are correctly identified and preserved.

Threats to information influence the organization’s ability to share it within, or to preserve its scarcity outside. Furthermore, threats that are carried out can cost millions in compensation and reputation, and can jeopardize an institution’s ability to survive. Here are some of the examples in which the making available of information that should have been kept scarce or the restricting of information that should have been shareable has damaged an organization.

Posted Date: 10/8/2012 4:32:22 AM | Location : United States







Related Discussions:- What is information security, Assignment Help, Ask Question on What is information security, Get Answer, Expert's Help, What is information security Discussions

Write discussion on What is information security
Your posts are moderated
Related Questions
(a) Briefly explain the following security goals provided by cryptography: confidentiality, authentication, integrity and non-repudiation. (b) State Kerckhoff's Princip

TOKEN RING Many LAN methods that are ring topology need token passing for synchronized access to the ring. The ring itself is acts as a single shared communication phase. Both

Address resolution algorithms may be grouped into three basic types: Table lookup Closed-form computation Message Exchange 1. TABLE LOOKUP: In Table Loo

Bridges perform both in the data link layers and physical of LANs of same kind. They split a bigger network in to smaller segments. They have logic that accept them to store the

Designing and coding of Job search mechanism: Project Title: FREEHIVE (Sep 2005- Nov 2006) Role             : Developer Domain         : Social Network Client

Selecting a Risk Control Strategy Risk controls involve selecting one of the 4 risk control strategies for every vulnerability. The flowchart is shown in the figure given below

Question: (a) Draw the waveform for an asynchronous transmission with the following specifications: Character "H", one even parity bit, one start bit, one stop bit, and a b

PARITY BIT: A parity bit is an extra bit transmitted with data item select to give the resulting bit odd or even parity. For example an even parity data packet 10100001 has p

FRAGMENTATION AND PATH MTU IPv6 source is responsible for fragmentation. Routers simply drop datagrams bigger than network MTU. So source have to fragment datagram to arrive d

Da t a compre s sion and the trans p ort s e rvices,   The main purpose of the transport layer is to provide services which are efficient, reliable and cost-effecti