When thinking about information security, it’s important to remember that as a discipline and as a profession, information security has a vast scope. Information security involves protecting components as small as tiny integrated circuits all the way up to massive clusters of servers that may involve thousands of unique machines. Information security involves protecting local private networks that people may have in their homes or apartments all the way up to massive wide-area networks or even the entire Internet. Information security involves protecting hardware, software, operating systems, databases, networks, and so forth.
Clearly, the scope of inquiry in information security is vast, continuously changing, and ever-growing. Broadly speaking, however, we can think about information security as being concerned with the protection of information assets. When we say “information assets”, we are referring to the elements of an information system that have value. Since value lies at the core of determining where we should focus our information security efforts, a critical first step is to identify precisely which information assets within our organization have the greatest value, and to whom those items have value.
One good way of thinking about information technology assets is to subdivide those assets into three categories. First, we have hardware assets, which can include computing systems, mobile devices, networks, and communications channels. Second, we have software assets, which can include operating systems, off-the-shelf application programs, mobile apps, as well as custom or customized application programs. Third, we have data assets, which include our files or databases -- that is, the information that we generate in our daily lives or in the process of carrying out our business. As we will see in our discussion of asset valuation, it is often these data assets that have the greatest value of all.
Home
»
information assets
»
information security
»
Information Assets and the Scope of Information Security
Related Posts
Prerequisites for Attacking an Information System
In order for an attack on an information system to succeed, an attacker must possess three specific [...]
Using Multiple Controls or Countermeasures for Information Security
In this post I would like to talk about using multiple controls or countermeasures for information s[...]
A Multilayered Approach to Information Security
Establishing multiple layers of defense is critical to protecting valuable information assets. An ef[...]
Physical, Procedural, and Technical Controls in Information Security
In this post, I will briefly discuss the three major types or categories of controls that can be use[...]
Types of Information System Attackers
Who are these people who seek to compromise the confidentiality, integrity, or availability of our i[...]
Subscribe to:
Post Comments
(
Atom
)
0 comments :
Post a Comment
Click to see the code!
To insert emoticon you must added at least one space before the code.