1.2 DEFINATION AND NEEDS OF INFORMATION SECURITY
Information Security means protection of information and information system from unauthorized access, modification and misuse of information or destruction. The basic of information security is to deal with protecting data from people or software having malicious intentions. In this unit we discuss about the factors which are responsible to introduce a threat to an organization system and the defensive mechanisms which can be adopted by the organization against them.
As shown in the Figure 1.1, the information security is mainly concerned with the three aspects of data regardless of the form they take data.
· Confidentiality
· Integrity
· Availability
We will discuss these terms later in this unit. The terms, information security and computer security frequently are being used interchangeably. Both the fields are related to each other and have the common goals of protecting the information. But there are some differences between the two. The basic difference in both the approaches are:
Methodology used for providing solutions and areas of Concentration
The computer security can focus on availability and correct operation of system without any knowledge of information storage and processing by the computer.
One question might have come up in your mind that how important is the Information Security in a system? Briefly we can say the basic needs to introduce information security systems are to ensure that the information stored securely in systems. Now a days, the information is collected, processed and stored in computer and transmitted through a network to the other computers. This information is confidential which is about their employees, customers, products, researches, financial information etc. if this precious information falls in wrong hands then it will be misused. So, in an organization we need a secure and powerful system which can stop any hackers or software to penetrate. So, the field of information security has grown up a great deal in recent years which answers the issue of protection of confidential information in business environment.

Comments
Post a Comment