Information Security - Conclusion

Conclusion

Information security is the ongoing process of exercising due care and due diligence to protect information, and information systems, from unauthorized access, use, disclosure, destruction, modification, or disruption or distribution. The never ending process of information security involves ongoing training, assessment, protection, monitoring & detection, incident response & repair, documentation, and review. This makes information security an indispensable part of all the business operations across different domains.

Read more about this topic:  Information Security

Famous quotes containing the word conclusion:

    No one can write a best seller by trying to. He must write with complete sincerity; the clichés that make you laugh, the hackneyed characters, the well-worn situations, the commonplace story that excites your derision, seem neither hackneyed, well worn nor commonplace to him.... The conclusion is obvious: you cannot write anything that will convince unless you are yourself convinced. The best seller sells because he writes with his heart’s blood.
    W. Somerset Maugham (1874–1966)

    The conclusion suggested by these arguments might be called the paradox of theorizing. It asserts that if the terms and the general principles of a scientific theory serve their purpose, i. e., if they establish the definite connections among observable phenomena, then they can be dispensed with since any chain of laws and interpretive statements establishing such a connection should then be replaceable by a law which directly links observational antecedents to observational consequents.
    —C.G. (Carl Gustav)

    A certain kind of rich man afflicted with the symptoms of moral dandyism sooner or later comes to the conclusion that it isn’t enough merely to make money. He feels obliged to hold views, to espouse causes and elect Presidents, to explain to a trembling world how and why the world went wrong. The spectacle is nearly always comic.
    Lewis H. Lapham (b. 1935)