0% found this document useful (0 votes)
11 views2 pages

New Microsoft Word Document

Information security involves protecting sensitive data from unauthorized access, disclosure, alteration, and destruction. It includes ensuring confidentiality, integrity, and availability of data and systems through authentication, authorization, encryption, firewalls, vulnerability management, incident response, security policies and procedures, security awareness training, physical security, regular audits and monitoring, patch management, and data backups.

Uploaded by

yosol83461
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views2 pages

New Microsoft Word Document

Information security involves protecting sensitive data from unauthorized access, disclosure, alteration, and destruction. It includes ensuring confidentiality, integrity, and availability of data and systems through authentication, authorization, encryption, firewalls, vulnerability management, incident response, security policies and procedures, security awareness training, physical security, regular audits and monitoring, patch management, and data backups.

Uploaded by

yosol83461
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Information security, often referred to as InfoSec, is a crucial aspect of protecting

sensitive data from unauthorized access, disclosure, alteration, and destruction. Here are
some basics of information security:

1. Confidentiality:
 Ensures that information is only accessible to authorized individuals or
systems.
2. Integrity:
 Guarantees the accuracy and reliability of data by preventing unauthorized
alterations.
3. Availability:
 Focuses on ensuring that information and systems are available and
accessible when needed, without compromise.
4. Authentication:
 Verifies the identity of users or systems attempting to access information
or resources.
5. Authorization:
 Determines the level of access or permissions granted to authenticated
users based on their roles and responsibilities.
6. Encryption:
 Converts data into a secure form to protect it from unauthorized access
during transmission or storage.
7. Firewalls:
 Acts as a barrier between a trusted internal network and untrusted external
networks, controlling incoming and outgoing network traffic.
8. Vulnerability Management:
 Involves identifying, assessing, and mitigating potential weaknesses in
systems to prevent exploitation.
9. Incident Response:
 Establishes a plan to address and manage security incidents promptly,
minimizing damage and reducing recovery time.
10. Security Policies and Procedures:
 Defines rules and guidelines for secure practices within an organization,
outlining expectations for employees and users.
11. Security Awareness Training:
 Educates employees and users about potential security threats, best
practices, and their role in maintaining information security.
12. Physical Security:
 Focuses on safeguarding physical assets, such as servers, data centers, and
other critical infrastructure.
13. Regular Audits and Monitoring:
 Involves periodic assessments, audits, and continuous monitoring to
identify and address potential security risks.
14. Patch Management:
 Ensures that software and systems are regularly updated with the latest
security patches to address vulnerabilities.
15. Data Backups:
 Regularly backing up critical data to prevent loss in the event of data
corruption, accidental deletion, or cyber attacks.

You might also like