This is the first book to introduce the full spectrum of security and risks and their management. Author and field expert Bruce Newsome helps readers learn how to understand, analyze, assess, control, and generally manage security and risks from the personal to the operational. They will develop the practical knowledge and skills they need, including analytical skills, basic mathematical methods for calculating risk in different ways, and more artistic skills in making judgments and decisions about which risks to control and how to control them.
Chapter 14: Information, Communications, and Cyber Security
Information, Communications, and Cyber Security
This chapter covers the increasingly salient domains of information, communications, and cyber security. The five main sections below define information, the technologies, and cyberspace; describe the different sources of malicious activities; describe the access vectors and how they can be controlled; describe the actual malicious activities; and give advice on how to provide information and cyber security in general.
This section defines information security, information communications technology, and cyber space.
Information security includes the security of information in all its forms, of which the most important conventional categories are verbal and cognitive forms, hard forms (including paper documents and artifacts), information technology (IT), information and communications technology (ICT), and cyber space (essentially electronically networked information and ICTs).