What is information security, Computer Network Security

What is information security

Information security protects information (and facilities and systems which store, use and transmit it) from a broad range of threats, in order to preserve the value of it to an organization.

The definition stated above of information security is adapted from that of American National Security Telecommunications and Information Systems Security Committee (NSTISSC).

There are two significant characteristics of information which determine its value to an organization:

•The scarcity of information outside the organization;

•The shareability of information within the organization.

Simplifying, these characteristics state that information is valuable if it provides advantage those who have it, compared with those who do not.Therefore the value of any piece of information relates to the levels of shareability and scarcity. The goal of information security is to preserve the value of information by ensuring that these levels are correctly identified and preserved.

Threats to information influence the organization’s ability to share it within, or to preserve its scarcity outside. Furthermore, threats that are carried out can cost millions in compensation and reputation, and can jeopardize an institution’s ability to survive. Here are some of the examples in which the making available of information that should have been kept scarce or the restricting of information that should have been shareable has damaged an organization.

Posted Date: 10/8/2012 4:32:22 AM | Location : United States







Related Discussions:- What is information security, Assignment Help, Ask Question on What is information security, Get Answer, Expert's Help, What is information security Discussions

Write discussion on What is information security
Your posts are moderated
Related Questions
Documenting the Results of Risk Assessment The goal of this process is to recognize the information assets, list them, and rank according to those most required protection. The

The first and foremost need of  any business is a role to perform for its client base, and for the spammer this will typically be the role of advertising products which, due to the

Host-Based IDS A host-based IDS (HIDS) resides on a particular computer or server and monitors activity only on that system. HIDS also called as system integrity verifiers as th

Need Assignemnt help in Information security assignemnt

Title: Perimeter Network Security System Outline Requirements The University is based in Glasgow, and provides higher education services to its students and staff. It is loc

Encryption Key Size When using ciphers, the size of crypto variable or key is quite important as the strength of many encryption applications and cryptosystems were measured by

Websphere Administrator: Working as Websphere Administrator in the department called DART (Database Architecture Re-Engineering and Tuning). The major responsibilities are t

FIREWALL ANALYSIS TOOLS There are a number of tools automate remote discovery of firewall rules and assist the administrator in analyzing rules Administrators who feel wary of u

which is best algorithm

(a) Describe the concept of zero knowledge proofs. Give a practical example. (b) Explain how a one way hash function works. (c) What are message authentication codes? (d)