Skip to content
Related Articles

Related Articles

Improve Article
Save Article
Like Article

Need Of Information Security

  • Last Updated : 25 Aug, 2021

Information system means to consider available countermeasures or controls stimulated through uncovered vulnerabilities and identify an area where more work is needed. The purpose of data security management is to make sure business continuity and scale back business injury by preventing and minimizing the impact of security incidents. The basic principle of Information Security is: 

  • Confidentially
  • Authentication
  • Non-Repudiation
  • Integrity

The need for Information security:  

  1. Protecting the functionality of the organization: 
    The decision maker in organizations must set policy and operates their organization in compliance with the complex, shifting legislation, efficient and capable applications.
  2. Enabling the safe operation of applications: 
    The organization is under immense pressure to acquire and operates integrated, efficient and capable applications. The modern organization needs to create an environment that safeguards application using the organizations IT systems, particularly those application that serves as important elements of the infrastructure of the organization. 
  3. Protecting the data that the organization collect and use: 
    Data in the organization can be in two forms are either in rest or in motion, the motion of data signifies that data is currently used or processed by the system. The values of the data motivated the attackers to seal or corrupts the data. This is essential for the integrity and the values of the organization’s data. Information security ensures the protection of both data in motion as well as data in rest. 
  4. Safeguarding technology assets in organizations: 
    The organization must add intrastate services based on the size and scope of the organization. Organizational growth could lead to the need for public key infrastructure, PKI an integrated system of the software, encryption methodologies. The information security mechanism used by large organizations is complex in comparison to a small organization. The small organization generally prefers symmetric key encryption of data. 
     

 

My Personal Notes arrow_drop_up
Recommended Articles
Page :

Start Your Coding Journey Now!