Information Security – Overview

Information security seeks to protect the confidentiality, integrity, and availability of data and programs from those with malicious intentions like unauthorized access, change, or destruction. Confidential information must be protected both in transit and at rest. For example, if Alice sends Bob a confidential e-mail, she wants to be sure that Eve can’t intercept and read the e-mail in transit. If the e-mail is still confidential after Bob receives it, he needs to make sure that it is stored securely so that Eve can’t access it later.