1Definition2Overview2.1Threats2.1.1Responses to threats3History4Basic principles4.1Key concepts4.1.1Confidentiality4.1.2Integrity4.1.3Availability4.1.4Non-repudiation5Risk management5.1Security controls5.1.1Administrative5.1.2Logical5.1.3Physical5.2Defense in depth5.3Security classification for information5.4Access control5.4.1Identification5.4.2Authentication5.4.3Authorization5.5Cryptography6Process6.1Security governance6.2Incident response plans6.2.1Preparation6.2.2Identification6.2.3Containment6.2.4Eradication6.2.5Recovery6.2.6Lessons Learned6.3Change management7Business continuity8Laws and regulations9Information security culture10Sources of standards11See also12References13Further reading13.1Bibliography14External links Definition Information Security Attributes: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are composed in three main portions, hardware, software and communications with the purpose to help identify and apply information security…
Read more