What is information security, Computer Network Security

What is information security

Information security protects information (and facilities and systems which store, use and transmit it) from a broad range of threats, in order to preserve the value of it to an organization.

The definition stated above of information security is adapted from that of American National Security Telecommunications and Information Systems Security Committee (NSTISSC).

There are two significant characteristics of information which determine its value to an organization:

•The scarcity of information outside the organization;

•The shareability of information within the organization.

Simplifying, these characteristics state that information is valuable if it provides advantage those who have it, compared with those who do not.Therefore the value of any piece of information relates to the levels of shareability and scarcity. The goal of information security is to preserve the value of information by ensuring that these levels are correctly identified and preserved.

Threats to information influence the organization’s ability to share it within, or to preserve its scarcity outside. Furthermore, threats that are carried out can cost millions in compensation and reputation, and can jeopardize an institution’s ability to survive. Here are some of the examples in which the making available of information that should have been kept scarce or the restricting of information that should have been shareable has damaged an organization.

Posted Date: 10/8/2012 4:32:22 AM | Location : United States







Related Discussions:- What is information security, Assignment Help, Ask Question on What is information security, Get Answer, Expert's Help, What is information security Discussions

Write discussion on What is information security
Your posts are moderated
Related Questions
How can I get help for Linux automotion configuration (Network, virtualization, security and Firewal etc) with bash scrip. What is the charge for.

ACCESS CONTROL DEVICES Successful access control system includes number of components, which depends on system’s requirements for authentication and authorization. Powerful auth

Network-Based IDS (NIDS) A NIDS resides on computer or appliance connected to segment of an organization’s network and looks for signs of attacks. While examining packets, a NID

The Cost Benefit Analysis (CBA) Formula CBA determines that whether the control alternative being evaluated is worth cost incurred to control vulnerability or not. CBA easily ca

For simplicity, each character is regarded as one data packet, which means that the data in each packet should have the max length of only 1 byte. Your own packet header (not th

- Alice, Bob and Charlie have a secret key a=3, b=4, c=5, in that order. - They would like to find a common secret key using Diffie-Hellan key exchange protocol (with g=2, p=5).

Question : (a) What do you meant by the term "Bastion Host"? What is its use? (b) "Hostile" Java applets will do undesirable actions. Mention two problems caused by Hosti

QUESTION : a) A datagram of 3000 bytes has to travel over a network with a MTU size of 1000 bytes. Describe how fragmentation can be used to solve this problem. You should pr

how to access tomcat by internet

how did slavery influence life in the colonies