• Home
  • Archive
  • Tools
  • Contact Us

The Customize Windows

Technology Journal

  • Cloud Computing
  • Computer
  • Digital Photography
  • Windows 7
  • Archive
  • Cloud Computing
  • Virtualization
  • Computer and Internet
  • Digital Photography
  • Android
  • Sysadmin
  • Electronics
  • Big Data
  • Virtualization
  • Downloads
  • Web Development
  • Apple
  • Android
Advertisement
You are here:Home » What is Information Security

By Abhishek Ghosh February 24, 2024 7:36 pm Updated on February 24, 2024

What is Information Security

Advertisement

Information security is a state of technical or non-technical systems for information processing, storage and storage, which is intended to ensure the protection goals of confidentiality, availability and integrity. Information security serves to protect against dangers or threats, to avoid economic damage and to minimize risks.

In practice, information security in the context of IT security management is based on the international, among other things. In many countries, an approach based on IT baseline protection is widespread. In the field of evaluation and certification of IT products and systems, the ISO/IEC 15408 standard (Common Criteria) is often used. Many of the following terms are interpreted differently depending on the author and environment.

For the abbreviation IT, the term information technology is used synonymously with information technology. The technical processing and transmission of information is at the forefront of IT.

Advertisement

---

The property of functional safety refers to the fact that a system behaves in accordance with the expected functionality and can also include further risk-reducing measures. These measures are then referred to as functional safety. Information security refers to the protection of the technical processing of information and is a property of a functionally reliable system. It is intended to prevent unauthorized data manipulation or the disclosure of information.

The term information security often refers to global information security in which the number of possible malicious scenarios is reduced in summary or the effort required to compromise the operator is disproportionate to the expected information gain. From this point of view, information security is an economic factor that must be reckoned with, for example, in companies and organizations. In addition, the term also refers to security under a certain scenario. In this sense, information security exists when it is no longer possible to attack the system via an already known path. It is called a binary quantity because the information can be either certain or not certain when using this particular method.

What is Information Security

The following aspects are included in the comprehensive term information security (protection of processed information):

IT security

IT security refers to strategies and measures to ensure the availability of IT systems and to prevent unauthorized access and unauthorized modification of information. IT security thus means sealing off IT systems against external attacks and protecting against imminent dangers from within.

IT security plays a key role in the security of socio-technical systems. IT or ICT systems are part of the socio-technical systems. One of the tasks of IT security is the protection of ICT systems of organizations (e.g. companies) against threats. Among other things, this is intended to prevent economic damage.

IT security is a part of information security. In contrast to IT security, information security includes not only the security of IT systems and the data stored therein, but also the security of information that is not processed electronically; For example, the “principles of information security” can also be applied to a restaurant’s hand-written recipes (since the confidentiality, integrity and availability of the recipes can be extremely important for the restaurant, even if that restaurant is operated completely without the use of any IT system).

Computer security

Computer security is the security of a computer system against failure (referred to as unplanned or planned downtime) and manipulation (data security) as well as against unauthorized access.

Data security

Data security is a term that is often associated with data protection and must be distinguished from it: data security has the technical goal of securing data of any kind to a sufficient extent against loss, manipulation and other threats. Adequate data security is a prerequisite for effective data protection.

There is an approach called data-centric security, which focuses on the security of the data itself, rather than the security of networks, servers, or applications.

Data backup

Data backup was the original legal term for data security.

Privacy

Data protection is not about protecting general data from damage, but about protecting personal data from misuse. The protection of personal data is based on the principle of informational self-determination.

Privacy must be protected, i.e. personal data and anonymity must be preserved. In addition to data security, data protection requires the exclusion of access to data with unauthorized reading by unauthorized third parties.

Only if appropriate protective measures are taken can it be assumed that confidential or personal data will not fall into the hands of unauthorized persons. As a rule, this refers to technical and organizational measures for data protection, which are described in particular in Art.

Facebook Twitter Pinterest

Abhishek Ghosh

About Abhishek Ghosh

Abhishek Ghosh is a Businessman, Surgeon, Author and Blogger. You can keep touch with him on Twitter - @AbhishekCTRL.

Here’s what we’ve got for you which might like :

Articles Related to What is Information Security

  • Top Types of Data Security Technology: How to Keep Your Business Safe

    Businesses have a duty to protect the data of their customers. This means implementing security measures to keep data safe from thieves and hackers. There are many different types of data security technology that businesses can use, but not all of them are created equal. This blog post will discuss the top types of data […]

  • Developing Privacy Compliant Big Data Apps on IBM Cloud

    A key theme of this work is to answer the key question “Can we use IBM’s solutions to develop various privacy law complainant applications?”.

  • Theoretical Foundations of Big Data : Part 3

    Theoretical Foundations of Big Data is third and final part of our series of articles. We have talked about Data Mining, OLAP & softwares.

  • Big Data and Privacy : Data Leakage

    Here is Another Practical Discussion Around Big Data and Privacy. In our earlier article we mainly discussed maintaining compliance for the app developers.

performing a search on this website can help you. Also, we have YouTube Videos.

Take The Conversation Further ...

We'd love to know your thoughts on this article.
Meet the Author over on Twitter to join the conversation right now!

If you want to Advertise on our Article or want a Sponsored Article, you are invited to Contact us.

Contact Us

Subscribe To Our Free Newsletter

Get new posts by email:

Please Confirm the Subscription When Approval Email Will Arrive in Your Email Inbox as Second Step.

Search this website…

 

vpsdime

Popular Articles

Our Homepage is best place to find popular articles!

Here Are Some Good to Read Articles :

  • Cloud Computing Service Models
  • What is Cloud Computing?
  • Cloud Computing and Social Networks in Mobile Space
  • ARM Processor Architecture
  • What Camera Mode to Choose
  • Indispensable MySQL queries for custom fields in WordPress
  • Windows 7 Speech Recognition Scripting Related Tutorials

Social Networks

  • Pinterest (24.3K Followers)
  • Twitter (5.8k Followers)
  • Facebook (5.7k Followers)
  • LinkedIn (3.7k Followers)
  • YouTube (1.3k Followers)
  • GitHub (Repository)
  • GitHub (Gists)
Looking to publish sponsored article on our website?

Contact us

Recent Posts

  • Cloud-Powered Play: How Streaming Tech is Reshaping Online GamesSeptember 3, 2025
  • How to Use Transcribed Texts for MarketingAugust 14, 2025
  • nRF7002 DK vs ESP32 – A Technical Comparison for Wireless IoT DesignJune 18, 2025
  • Principles of Non-Invasive Blood Glucose Measurement By Near Infrared (NIR)June 11, 2025
  • Continuous Non-Invasive Blood Glucose Measurements: Present Situation (May 2025)May 23, 2025
PC users can consult Corrine Chorney for Security.

Want to know more about us?

Read Notability and Mentions & Our Setup.

Copyright © 2026 - The Customize Windows | dESIGNed by The Customize Windows

Copyright  · Privacy Policy  · Advertising Policy  · Terms of Service  · Refund Policy