Usage of Information security

Avatar ByJayanthi

Usage of Information security

Reading Time: 2 minutes

‘Information security’ in the broadest sense is the protection of information and assets from malicious elements. Individuals and organizations are both subjected to virus, ransomware, data breach attacks and hence this concept of ‘information security’ applies to all. Let us see a few of the ‘Information security’ concepts being applied to organizations as well as individuals.

Physical security:

Physical security is one of the most easily understood concepts of Information security. CCTV cameras, security badges, biometrics, security guards are all examples of common physical security measures that can protect an organization. 

For an individual again, physical security measures will involve security guards and CCTV cameras to protect vital resources at home.

Security policies:

‘Security policy’ is a physical document that states how the different assets are to be secured or how certain aspects in a company should be used (for example, how email should be used, how passwords should be constructed)

This concept comes into play as various organizations ponder how they should regulate emails, handle data breaches, implement password policy to name a few of the aspects. Implementing security policies from SANS institute will definitely improve the security posture of an organization.

Security policies hence form a vital block in any organization.

Network security:

Some sectors such as the financial sector have to implement a much more robust security architecture. Banking websites will be prone to attacks and hence they have to harden their systems. 

High prolific websites must make use of network security principles,encryption and end-point security to make sure that the data that they possess does not fall into wrong hands.

Read about:  Cryptography

Identity and access management:

Most of the transactions today are conducted online. Just making sure that the correct individual is authenticated and given access to his online resources is the broad concept of identity management.

This again must be implemented in all websites that deal with shopping, banking, email and finance management.

In addition to the above concepts, firewalls, anti-virus software, VPN software are other examples of popular security measures that are used by individuals and organizations.

This post is for alphabet ‘U’ of the BlogchatterA2Z challenge… the previous alphabets are listed here:

  1.      ‘A’ – Asset
  2.     ‘B’ – What is Blockchain ?
  3.      ‘C’ – Caesar cipher
  4.     ‘D’ –  Detroit
  5.     ‘E’ – Empowering women
  6.     ‘F’ – Four concepts of Blockchain
  7.     ‘G’ – Go green
  8.     ‘H’ – Hyperledger Composer
  9.     ‘I’ – India
  10.     ‘J’ – Java 101
  11.     ‘K’ – Kulambu
  12.     ‘L’ – List of Information security certifications
  13.     ‘M’ – Michigan
  14.     ‘N’ – NIST publications
  15.     ‘O’ – Object oriented programming
  16.     ‘P’ – Palm tree fruit
  17.     ‘Q’ – Quiet
  18.     ‘R’ – For the love of ‘Reading’….
  19.     ‘S’ – Security
  20.     ‘T’ – Time



About the author


Jayanthi administrator

Jayanthi Manikandan has an undergraduate degree in Computer Science from India and a Master's degree in Information systems with a specialization in Information security from Detroit, MI, USA. She has written blogs for Simplilearn, Whizlabs software, InfoSec institute and Jigsaw academy. She has created e-learning videos for Whizlabs software and Twenty19. She has been passionate about Information security and has several years of experience writing on various technical topics. Additionally, she loves to pen a few personal thoughts here as well! :)

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.