Conclusion
Information security is the ongoing process of exercising due care and due diligence to protect information, and information systems, from unauthorized access, use, disclosure, destruction, modification, or disruption or distribution. The never ending process of information security involves ongoing training, assessment, protection, monitoring & detection, incident response & repair, documentation, and review. This makes information security an indispensable part of all the business operations across different domains.
Read more about this topic: Information Security
Famous quotes containing the word conclusion:
“We must not leap to the fatalistic conclusion that we are stuck with the conceptual scheme that we grew up in. We can change it, bit by bit, plank by plank, though meanwhile there is nothing to carry us along but the evolving conceptual scheme itself. The philosophers task was well compared by Neurath to that of a mariner who must rebuild his ship on the open sea.”
—Willard Van Orman Quine (b. 1908)
“The conclusion suggested by these arguments might be called the paradox of theorizing. It asserts that if the terms and the general principles of a scientific theory serve their purpose, i. e., if they establish the definite connections among observable phenomena, then they can be dispensed with since any chain of laws and interpretive statements establishing such a connection should then be replaceable by a law which directly links observational antecedents to observational consequents.”
—C.G. (Carl Gustav)
“The conclusion has never changed: the worst sort of people come here for the worst sort of reasons and put upon those of us who have conveniently forgotten where we came from and how we got here.”
—Anna Quindlen (b. 1952)