answersLogoWhite

0


Best Answer

Let's just say you have lots of vital information such as customer specifics, technological discovery that you'd want to implement into your company's operations, etc. You'd want to protect them from being read, which may lead onto them being used. You lose competitive edge over others as the information can be used by others.

There are many forms of attacks available:

hackers

trojans/malware

viruses

espionage

STAFF

There are many forms of information security software/hardware available. From monitoring of incoming/outgoing information on the internet, network gateway security to encryption strategies that stops files being used.

I find that encryption is the most useful one as no matter how much monitoring you do, you cannot stop people from stealing through USB, portable harddrive, etc. Or you'd have to be on constant vigilance when the monitoring software alarms you of the stealing actions.

Some opensource encryption softwares (i.e. free) avaiable on the internet, though I've forgotten the names. These softwares provide single user information security.

Some bigger enterprise security softwares such as EZ-Lock DRM by Digital Commerce Information provides full encryption strategies that allows different range of users, from 10 users to 30000. Its core ability is that users do not have to change any working habits but at the same time having everything encrypted and thus secured.

Others such as Adaptive Network Security from Brandford Network emphasizes on recognizing friends and foes. It integrates and correlates network resources, user information, and device information to automate security and IT operations.

User Avatar

Wiki User

14y ago
This answer is:
User Avatar
More answers
User Avatar

Wiki User

11y ago

The security of data and information is of vital importance to any organization and it is therefore a business decision as to what information should be protected and to what level. The business's approach to the protection and use of data should be contained in a security policy to which everyone in the organization should have access and the contents of which everyone should be aware. The system in place to enforce the security policy and ensure that the business's IT security objectives are met is known as the Information Security Management System (ISMS). Information Security Management supports corporate governance by ensuring that information security risks are properly managed.

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What does information security protect information from?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What type of information does operations security protect from adversary observation and collection in a way that traditional security programs cannot?

critical information


What type of information does operation security protect from adversary observation and collection in a way that traditional security programs cannot?

critical information


Which of the following is a valid reason to classify information?

To protect national security


What does information protection refer to?

Security of the systems and tools to protect the information from physical or electronic attack.


What type of information does operations security protect from the adversary observation and collection in a way that traditional security programs cannot?

Operations security


The only lawful reason to classify information is to protect national security?

True


What is the purpose of information systems security?

to protect your vital information from being misused http://digital-commerce-information-terry.blogspot.com/


Why do you have to enter a security code?

Security codes are normally used to protect data or information from getting into the wrong hands. You enter the security code in order to prove that you are authorized to access the data or information contained.


What can be done to protect your voip security?

Most threats to VOIP security is on the business side. But personal use can also have security problems. You definitely want to make sure the protocols are set up to protect any information.


What does protection refers to?

Security of the systems and tools to protect the information from physical or electronic attack.


Does derivative classification of information help protect your national security and limits access to individuals who may require that information?

true


Have an individual responsibility to protect unclassified sensitive and classified information What should you do if you experience an information security violation?

report the violation.