"Secures the information assets of an organization." (David G Hill, "Data Protection: Governance, Risk Management, and Compliance", 2009)
"The practice of protecting information in all its forms, whether written, spoken, electronic, graphical, or using other methods of communication." (Mark Rhodes-Ousley, "Information Security: The Complete Reference, Second Edition" 2nd Ed., 2013)
"Is the practice of protecting information from unauthorised access, use, disclosure, disruption, modification or destruction. Information security encompasses both physical and electronic information." (David Sutton, "Information Risk Management: A practitioner’s guide", 2014)
"Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide integrity, confidentiality, and availability." ( Manish Agrawal, "Information Security and IT Risk Management", 2014)
"The preservation of confidentiality, integrity and availability of information [1]" (David Sutton, "Information Risk Management: A practitioner’s guide", 2014)
"The techniques and policies used to ensure proper access to data" (Nell Dale & John Lewis, "Computer Science Illuminated" 6th Ed., 2015)
"The discipline of information security goes beyond simply restricting access to confidential business information. Information security can be defined as the implementation and management of the set of tools and processes whose goal is to preserve the three key elements of information security in the business: confidentiality, integrity and availability." (Sumo Logic) [source]
No comments:
Post a Comment