Building peace in the minds of men and women

Internet Governance Glossary

2

2.36 Information Security

Sum of the processes and technologies used to protect information assets from unauthorized acquisition, disclosure, manipulation, modification, or damage and loss.

Note:

Information security on the one hand refers to the act of ensuring that data is not lost when critical issues arise, such as: natural disasters, computer/server malfunction, physical theft, or any other instance where data has the potential of being lost. On the other hand it refers to unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction.