What is information security? Definition, principles, and jobs (2024)

Feature

Information security is a set of practices intended to keep data secure from unauthorized access or alterations. Here's a broad look at the policies, principles, and people used to protect data.

By Josh Fruhlinger

Contributing writer, CSO |

Information security definition

Information security, sometimes abbreviated to infosec, is a set of practices intended to keep data secure from unauthorized access or alterations, both when it's being stored and when it's being transmitted from one machine or physical location to another. You might sometimes see it referred to as data security. As knowledge has become one of the 21st century's most important assets, efforts to keep information secure have correspondingly become increasingly important.

The SANS Institute offers a somewhat more expansive definition:

Information security refers to the processes and methodologies which are designed and implemented to protect print, electronic, or any other form of confidential, private and sensitive information or data from unauthorized access, use, misuse, disclosure, destruction, modification, or disruption.

Information security vs. cybersecurity

Because information technology has become the accepted corporate buzzphrase that means, basically, "computers and related stuff," you will sometimes see information security and cybersecurity used interchangeably. Strictly speaking, cybersecurity is the broader practice of defending IT assets from attack, and information security is a specific discipline under the cybersecurity umbrella. Network security and application security are sister practices to infosec, focusing on networks and app code, respectively.

Obviously, there's some overlap here. You can't secure data transmitted across an insecure network or manipulated by a leaky application. As well, there is plenty of information that isn't stored electronically that also needs to be protected. Thus, the infosec pro's remit is necessarily broad.

Information security principles

The basic components of information security are most often summed up by the so-called CIA triad: confidentiality, integrity, and availability.

  • Confidentiality is perhaps the element of the triad that most immediately comes to mind when you think of information security. Data is confidential when only those people who are authorized to access it can do so; to ensure confidentiality, you need to be able to identify who is trying to access data and block attempts by those without authorization. Passwords, encryption, authentication, and defense against penetration attacks are all techniques designed to ensure confidentiality.
  • Integrity means maintaining data in its correct state and preventing it from being improperly modified, either by accident or maliciously. Many of the techniques that ensure confidentiality will also protect data integrity—after all, a hacker can't change data they can't access—but there are other tools that help provide a defense of integrity in depth: checksums can help you verify data integrity, for instance, and version control software and frequent backups can help you restore data to a correct state if need be. Integrity also covers the concept of non-repudiation: you must be able to prove that you've maintained the integrity of your data, especially in legal contexts.
  • Availability is the mirror image of confidentiality: while you need to make sure that your data can't be accessed by unauthorized users, you also need to ensure that it can be accessed by those who have the proper permissions. Ensuring data availability means matching network and computing resources to the volume of data access you expect and implementing a good backup policy for disaster recovery purposes.

In an ideal world, your data should always be kept confidential, in its correct state, and available; in practice, of course, you often need to make choices about which information security principles to emphasize, and that requires assessing your data. If you're storing sensitive medical information, for instance, you'll focus on confidentiality, whereas a financial institution might emphasize data integrity to ensure that nobody's bank account is credited or debited incorrectly.

Information security policy

The means by which these principles are applied to an organization take the form of a security policy. This isn't a piece of security hardware or software; rather, it's a document that an enterprise draws up, based on its own specific needs and quirks, to establish what data needs to be protected and in what ways. These policies guide the organization's decisions around procuring cybersecurity tools, and also mandate employee behavior and responsibilities.

Among other things, your company's information security policy should include:

  • A statement describing the purpose of the infosec program and your overall objectives
  • Definitions of key terms used in the document to ensure shared understanding
  • An access control policy, determining who has access to what data and how they can establish their rights
  • A password policy
  • A data support and operations plan to ensure that data is always available to those who need it
  • Employee roles and responsibilities when it comes to safeguarding data, including who is ultimately responsible for information security

One important thing to keep in mind is that, in a world where many companies outsource some computer services or store data in the cloud, your security policy needs to cover more than just the assets you own. You need to know how you'll deal with everything from personally identifying information stored on AWS instances to third-party contractors who need to be able to authenticate to access sensitive corporate info.

Information security measures

As should be clear by now, just about all the technical measures associated with cybersecurity touch on information security to a certain degree, but there it is worthwhile to think about infosec measures in a big-picture way:

  • Technical measures include the hardware and software that protects data — everything from encryption to firewalls
  • Organizational measures include the creation of an internal unit dedicated to information security, along with making infosec part of the duties of some staff in every department
  • Human measures include providing awareness training for users on proper infosec practices
  • Physical measures include controlling access to the office locations and, especially, data centers

Information security jobs

It's no secret that cybersecurity jobs are in high demand, and in 2019 information security was at the top of every CIO's hiring wishlist, according to Mondo's IT Security Guide. There are two major motivations: There have been many high-profile security breaches that have resulted in damage to corporate finances and reputation, and most companies are continuing to stockpile customer data and give more and more departments access to it, increasing their potential attack surface and making it more and more likely they'll be the next victim.

There are a variety of different job titles in the infosec world. The same job title can mean different things in different companies, and you should also keep in mind our caveat from up top: a lot of people use "information" just to mean "computer-y stuff," so some of these roles aren't restricted to just information security in the strict sense. But there are general conclusions one can draw.

Information security analyst: Duties and salary
Let's take a look at one such job: information security analyst, which is generally towards the entry level of an infosec career path. CSO's Christina Wood describes the job as follows:

Security analysts typically deal with information protection (data loss protection [DLP] and data classification) and threat protection, which includes security information and event management (SIEM), user and entity behavior analytics [UEBA], intrusion detection system/intrusion prevention system (IDS/IPS), and penetration testing. Key duties include managing security measures and controls, monitoring security access, doing internal and external security audits, analyzing security breaches, recommending tools and processes, installing software, teaching security awareness, and coordinating security with outside vendors.

Information security analysts are definitely one of those infosec roles where there aren't enough candidates to meet the demand for them: in 2017 and 2018, there were more than 100,000 information security analyst jobs that were unfilled in the United States. This means that infosec analyst is a lucrative gig: the Bureau of Labor Statistics pegged the median salary at $95,510 (PayScale.com has it a bit lower, at $71,398).

Information security training and courses

How does one get a job in information security? An undergraduate degree in computer science certainly doesn't hurt, although it's by no means the only way in; tech remains an industry where, for instance, participation in open source projects or hacking collectives can serve as a valuable calling card.

Still, infosec is becoming increasingly professionalized, which means that institutions are offering more by way of formal credentials. Many universities now offer graduate degrees focusing on information security. These programs may be best suited for those already in the field looking to expand their knowledge and prove that they have what it takes to climb the ladder.

At the other end of the spectrum are free and low-cost online courses in infosec, many of them fairly narrowly focused. The world of online education is something of a wild west; Tripwire breaks down eleven highly regarded providers offering information security courses that may be worth your time and effort.

Information security certifications

If you're already in the field and are looking to stay up-to-date on the latest developments—both for your own sake and as a signal to potential employers—you might want to look into an information security certification. Among the top certifications for information security analysts are:

Many of the online courses listed by Tripwire are designed to prepare you for these certification exams. Best of luck in your exploration!

Related:

  • Data and Information Security
  • Security

Josh Fruhlinger is a writer and editor who lives in Los Angeles.

Follow

Copyright © 2020 IDG Communications, Inc.

7 hot cybersecurity trends (and 2 going cold)

What is information security? Definition, principles, and jobs (2024)

FAQs

What is information security your answer? ›

Information Security is basically the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information. Information can be physical or electronic one.

What is information security short definition? ›

The term 'information security' means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide integrity, confidentiality, and availability.

Why is information security important answer? ›

The Importance Of Information Security

Every organization needs protection against cyber attacks and security threats. Cybercrime and malware are constant threats to anyone with an Internet presence, and data breaches are time-consuming and expensive.

What are the 3 principles of information security? ›

When we discuss data and information, we must consider the CIA triad. The CIA triad refers to an information security model made up of the three main components: confidentiality, integrity and availability. Each component represents a fundamental objective of information security.

What is information security and principles? ›

What are the 3 Principles of Information Security? The basic tenets of information security are confidentiality, integrity and availability. Every element of the information security program must be designed to implement one or more of these principles. Together they are called the CIA Triad.

What is information security job? ›

Information security analysts typically do the following: Monitor their organization's networks for security breaches and investigate when one occurs. Use and maintain software, such as firewalls and data encryption programs, to protect sensitive information. Check for vulnerabilities in computer and network systems.

What are 4 types of information security? ›

There are four types of information technology security you should consider or improve upon:
  • Network Security.
  • Cloud Security.
  • Application Security.
  • Internet of Things Security.
3 Feb 2022

What is security and example? ›

Security is defined as being free from danger, or feeling safe. An example of security is when you are at home with the doors locked and you feel safe. noun.

What is information security and its need? ›

What is Information Security? Information security ensures good data management. It involves the use of technologies, protocols, systems and administrative measures to protect the confidentiality, integrity and availability of information.

How important is security? ›

Security cultivates situational awareness and maintains balance. Without security, individuals often become complacent and miss unusual behavior of civilians, employees and others around them. Awareness is an ongoing activity, and people want to do the right thing, so security guides a positive and proactive culture.

Why is information security? ›

It protects the organisation's ability to function. It enables the safe operation of applications implemented on the organisation's IT systems. It protects the data the organisation collects and uses. It safeguards the technology the organisation uses.

Who is responsible for information security? ›

A company's CISO is the leader and face of data security in an organization. The person in this role is responsible for creating the policies and strategies to secure data from threats and vulnerabilities, as well as devising the response plan if the worst happens.

What are the 5 basic principles of security? ›

The Principles of Security can be classified as follows:
  • Confidentiality: The degree of confidentiality determines the secrecy of the information. ...
  • Authentication: Authentication is the mechanism to identify the user or system or the entity. ...
  • Integrity: ...
  • Non-Repudiation: ...
  • Access control: ...
  • Availability:
5 Jun 2022

What are the different types of information security? ›

What Are the Types of Information Security?
  • Application Security. ...
  • Cloud Security. ...
  • Cryptography. ...
  • Infrastructure Security. ...
  • Incident Response. ...
  • Vulnerability Management. ...
  • Phishing. ...
  • Brute-Force Attacks.
2 Sept 2021

What is data security? ›

Data security refers to the process of protecting data from unauthorized access and data corruption throughout its lifecycle. Data security includes data encryption, hashing, tokenization, and key management practices that protect data across all applications and platforms.

What are the six principles of information security management? ›

The Six Principles of Cyber Security
  • Security beyond Firewall. Network security used to be achieved by scanning network traffic on various OSI layers. ...
  • Advanced Access Management. ...
  • Enhanced Application Security. ...
  • Trusted Attack Simulation. ...
  • Data Encryption. ...
  • Compliance Business Framework.

What is an information security class 8? ›

It is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access.

What are the chief principles of security Explain with examples? ›

The fundamental principles (tenets) of information security are confidentiality, integrity, and availability. Every element of an information security program (and every security control put in place by an entity) should be designed to achieve one or more of these principles. Together, they are called the CIA Triad.

Is information security a good job? ›

The job ranks above average for stress levels and below average on work-life balance, according to U.S. News data. However, the hard work that comes with the job is well-compensated with a median annual income of $103,590. Information security analyst also ranks No. 25 in the Best Jobs That Pay More Than $100K.

Which job is the best? ›

  1. Medical Professionals (Doctors and Surgeons) Healthcare offers one of the highest salary jobs in India. ...
  2. Data Scientist. ...
  3. Machine Learning Experts. ...
  4. Blockchain Developer. ...
  5. Full Stack Software Developer. ...
  6. Product Management. ...
  7. Management Consultant. ...
  8. Investment Banker.
3 days ago

Is cybersecurity a good job? ›

Cybersecurity has the two key logistical advantages for a strong career: Low to no unemployment and solid compensation. Plus, if you choose this path, you'll always have room to grow. You'll continually be learning new skills and working to understand new technologies.

WHAT is IT security risk? ›

The term “information security risk” refers to the damage that attacks against IT systems can cause. IT risk encompasses a wide range of potential events, including data breaches, regulatory enforcement actions, financial costs, reputational damage, and more.

How can we protect information security? ›

Here are some practical steps you can take today to tighten up your data security.
  1. Back up your data. ...
  2. Use strong passwords. ...
  3. Take care when working remotely. ...
  4. Be wary of suspicious emails. ...
  5. Install anti-virus and malware protection. ...
  6. Don't leave paperwork or laptops unattended. ...
  7. Make sure your Wi-Fi is secure.
8 Aug 2022

What are the three 3 threats to information security? ›

Information Security threats can be many like Software attacks, theft of intellectual property, identity theft, theft of equipment or information, sabotage, and information extortion.

What is security full form? ›

Security Full Form is “S-Sensible E-Efficient in work C-Claver U-Understanding R-Regular I-Intelligent T-Talent Y-Young” (समझदार, कुशल, चतुर, समझ, नियमित, बुद्धिमान, प्रतिभा, युवा).

What is security key? ›

You can set up your phone's built-in security key to safely sign in on devices running current versions of Chrome OS, iOS, macOS, and Windows. This helps protect your account from hackers, even if they've stolen info like your password.

What is security life? ›

Security is protection from, or resilience against, potential harm (or other unwanted coercive change) caused by others, by restraining the freedom of others to act.

Why is information security very important essay? ›

The information security in important in the organization because it can protect the confidential information, enables the organization function, also enables the safe operation of application implemented on the organization's Information Technology system, and information is an asset for an organization.

How did information security start? ›

The true birth of cybersecurity occurred in the 1970s. This began with a project called The Advanced Research Projects Agency Network (ARPANET). This was the connectivity network developed prior to the internet itself. A man named Bob Thomas determined it was possible for a computer program to move over a network.

What is the first step in information security? ›

The first step in securing your information is understanding your business. Building a concise definition of your business and its mode of operation will help you identify the threats and the applicable laws in the industry.

What is information security and IT's need? ›

What is Information Security? Information security ensures good data management. It involves the use of technologies, protocols, systems and administrative measures to protect the confidentiality, integrity and availability of information.

What is information security quizlet? ›

Information Security. The protection of information and information systems from unauthorized access, use, disclosure, modification, disruption, removal or destruction.

What is an information security class 8? ›

It is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access.

What is information security and privacy? ›

Privacy is when an individual's personal information, habits, and other sensitive data are protected from public disclosure. For information security, it means a company's confidential material cannot be taken or accessed by the public or another company.

How important is security? ›

Security cultivates situational awareness and maintains balance. Without security, individuals often become complacent and miss unusual behavior of civilians, employees and others around them. Awareness is an ongoing activity, and people want to do the right thing, so security guides a positive and proactive culture.

What is information security and types? ›

Since InfoSec covers many areas, it often involves the implementation of various types of security, including application security, infrastructure security, cryptography, incident response, vulnerability management, and disaster recovery.

Why is information security very important essay? ›

The information security in important in the organization because it can protect the confidential information, enables the organization function, also enables the safe operation of application implemented on the organization's Information Technology system, and information is an asset for an organization.

What is an example of logical security? ›

Logical Security is the use of software and systems to control and limit access to information. Anti-virus software, passwords, and encryption are all examples of logical security mechanisms.

What are characteristics of good IT security policies? ›

Confidentiality — Only individuals with authorization canshould access data and information assets. Integrity — Data should be intact, accurate and complete, and IT systems must be kept operational. Availability — Users should be able to access information or systems when needed.

What is the first step in Information security quizlet? ›

the initial step in establishing an information security program is the: development and implementation of an information security standards manual.

What are 4 types of information security? ›

There are four types of information technology security you should consider or improve upon:
  • Network Security.
  • Cloud Security.
  • Application Security.
  • Internet of Things Security.
3 Feb 2022

What are the 5 elements of security? ›

The U.S. Department of Defense has promulgated the Five Pillars of Information Assurance model that includes the protection of confidentiality, integrity, availability, authenticity, and non-repudiation of user data.

What is data security? ›

Data security refers to the process of protecting data from unauthorized access and data corruption throughout its lifecycle. Data security includes data encryption, hashing, tokenization, and key management practices that protect data across all applications and platforms.

Who is responsible for information security? ›

A company's CISO is the leader and face of data security in an organization. The person in this role is responsible for creating the policies and strategies to secure data from threats and vulnerabilities, as well as devising the response plan if the worst happens.

How can we protect information security? ›

Here are some practical steps you can take today to tighten up your data security.
  1. Back up your data. ...
  2. Use strong passwords. ...
  3. Take care when working remotely. ...
  4. Be wary of suspicious emails. ...
  5. Install anti-virus and malware protection. ...
  6. Don't leave paperwork or laptops unattended. ...
  7. Make sure your Wi-Fi is secure.
8 Aug 2022

What is the first step in information security? ›

The first step in securing your information is understanding your business. Building a concise definition of your business and its mode of operation will help you identify the threats and the applicable laws in the industry.

Top Articles
Latest Posts
Article information

Author: Greg Kuvalis

Last Updated:

Views: 6400

Rating: 4.4 / 5 (75 voted)

Reviews: 82% of readers found this page helpful

Author information

Name: Greg Kuvalis

Birthday: 1996-12-20

Address: 53157 Trantow Inlet, Townemouth, FL 92564-0267

Phone: +68218650356656

Job: IT Representative

Hobby: Knitting, Amateur radio, Skiing, Running, Mountain biking, Slacklining, Electronics

Introduction: My name is Greg Kuvalis, I am a witty, spotless, beautiful, charming, delightful, thankful, beautiful person who loves writing and wants to share my knowledge and understanding with you.