7

Information Security

Abstract

This chapter discusses methods to develop and implement an information security program through the use of the three pillars of information security—confidentiality, integrity, and availability.

Keywords

Availability; Bandwidth; Communications; Compartmentalization; Computer security; Confidentiality; Data transmission; Denial of service; Encryption; Hardware; Information security; Integrity; Least privilege; Network security; Redundancy; Server security; Software
Information security has become an increasingly prominent aspect of any organization’s security program as computers and information systems have become more and more predominant. Before the age of computers, information security was limited to ensuring files ...

Get Security for Business Professionals now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.