Information Security
Abstract
This chapter discusses methods to develop and implement an information security program through the use of the three pillars of information security—confidentiality, integrity, and availability.
Keywords
Availability; Bandwidth; Communications; Compartmentalization; Computer security; Confidentiality; Data transmission; Denial of service; Encryption; Hardware; Information security; Integrity; Least privilege; Network security; Redundancy; Server security; SoftwareGet Security for Business Professionals now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.