Information security

Ministry of Defence Information security, sometimes shortened to infosec, is the practice of protecting information by mitigating information risks. It is part of information risk management. It typically involves preventing or reducing the probability of unauthorized or inappropriate access to data or the unlawful use, disclosure, disruption, deletion, corruption, modification, inspection, recording, or devaluation of information. It also involves actions intended to reduce the adverse impacts of such incidents. Protected information may take any form, e.g., electronic or physical, tangible (e.g., paperwork), or intangible (e.g., knowledge). Information security's primary focus is the balanced protection of data confidentiality, integrity, and availability (also known as the "CIA" triad) while maintaining a focus on efficient policy implementation, all without hampering organization productivity. This is largely achieved through a structured risk management process that involves: * Identifying information and related assets, plus potential threats, vulnerabilities, and impacts; * Evaluating the risks * Deciding how to address or treat the risks, i.e., to avoid, mitigate, share, or accept them * Where risk mitigation is required, selecting or designing appropriate security controls and implementing them * Monitoring the activities and making adjustments as necessary to address any issues, changes, or improvement opportunities

To standardize this discipline, academics and professionals collaborate to offer guidance, policies, and industry standards on passwords, antivirus software, firewalls, encryption software, legal liability, security awareness and training, and so forth. This standardization may be further driven by a wide variety of laws and regulations that affect how data is accessed, processed, stored, transferred, and destroyed. However, the implementation of any standards and guidance within an entity may have limited effect if a culture of continual improvement is not adopted. Provided by Wikipedia
Showing 1 - 20 results of 109 for search 'Information Security', query time: 0.29s Refine Results
  1. 1
    by Information Security
    Published 2008
    Connect to this electronic resource
    eBook
  2. 2
  3. 3
    Other Authors: ...Sutton, David (Information security practitioner)...
    Connect to the full text of this electronic book
    eBook
  4. 4
  5. 5
  6. 6
  7. 7
    Published 2005
    ...ISC (Conference : Information security) Singapore)...
    Connect to the full text of this electronic book
    Conference Proceeding eBook
  8. 8
    ...United States. Information Security Oversight Office...
    Government Document Microform Serial
  9. 9
    Published 1996
    ...United States. Information Security Oversight Office...
    Government Document Book
  10. 10
    Published 1995
    ...United States. Information Security Oversight Office...
    Government Document Book
  11. 11
    Published 2001
    ...ISC (Conference : Information security) Málaga, Spain)...
    Conference Proceeding Book
  12. 12
    ...United States. Information Security Oversight Office...
    Get full text
    Government Document Serial
  13. 13
    Published 1999
    ...United States. Information Security Oversight Office...
    Government Document Microform Book
  14. 14
    ...United States. Information Security Oversight Office...
    Get full text
    Government Document Serial
  15. 15
    Published 2003
    ...ISC (Conference : Information security) Bristol, England)...
    Get full text
    Conference Proceeding eBook
  16. 16
    Published 2006
    ...ISC (Conference : Information security) Samos, Greece)...
    Connect to the full text of this electronic book
    Conference Proceeding Book
  17. 17
    Published 2007
    ...United States. Information Security Oversight Office...
    Get full text
    Government Document eBook
  18. 18
    Published 2009
    ...WISA (Workshop : Information security) Pusan, Korea)...
    Connect to the full text of this electronic book
    Conference Proceeding eBook
  19. 19
    Published 1998
    ...ISW (Workshop : Information security) Ishikawa-shi, Japan)...
    Conference Proceeding Book
  20. 20
    Published 2000
    ...ISW (Workshop : Information security) Wollongong, N.S.W.)...
    Conference Proceeding Book
Search Tools: RSS Feed Email Search