In a new digital era of transmutation that requires data as a fruitful asset, information security is vital to defend really important information against the precarious admission, use, divulgation, interruption, revising or deletion. Information security is imperative in case of any personal information, finances, intellectual possessions, and governmental documents to build trust, privacy, and consistency in the online environment.

What is Information Security?
Information Security, commonly known as InfoSec is the concept of defending information and information systems against different dangers. These risks may be either internal or external and they are meant to tamper with the confidentiality, integrity, or availability of information.
The fundamental goals of information security are also commonly known as CIA triad:
- Confidentiality- This refers to making information available to persons who are entitled to it.
- Integrity-Ensuring the truthfulness and that the data is complete.
- Availability - The presence of information at the point of time when required.
Types of Information Security
The sphere of information security is associated with a number of areas, all of them related to different kinds of threat and calling for distinct protection measures:
- Network Security- Secures a data transmission throughout networks against intrusions such as hackers, malwares and phishing.
- Application Security- This is a process involved with the securing of software applications to keep third parties away and leakage of information.
- Endpoint Security- Protects end user devices such as computers, smartphones and tablets against attacks.
- Cloud Security- This is concerned with the security of data, applications and infrastructures which have been used during cloud computing.
- Physical Security- This is the form of security that is concerned with the defense of the actual physical hardware and facilities that are used in the storage of critical information.
- Operational Security- These policies and procedures entail data asset management and protection.
Common Threats to Information Security
Making up threats to information systems, there is the following list:
- Malware Malware is software, which is meant to steal or harm information and includes viruses, worms and ransomware.
- Phishing Attacks- Distractive mails or messages made to show the user a persuasiveness in order to provide certain information of personal nature.
- Social Engineering: coaxing people in order to acquire secret information.
- Insider Threats- The access of employees or associates to damage the organization.
- Denial-of-Service (DoS) Attacks - Overloading a system to deprive those authorized users of its services.
- Data Breaches- Uncertified acquisition and theft of data within an organization.
- Authentication and Authorization- Verifying of the authenticity and the level of access that a user can get.
- Encryption -A process of transforming information into the secure form to avoid unauthorized handling.
- Firewalls and Antivirus Software There exist firewalls and antivirus software that block malicious traffic and aid in the detection of threats.
- Updates and Patching regularly- Repairing the systems and software vulnerabilities.
- Data Backup and Recovery -The possibility to restore data in case of its loss or attack.
- User Education-train the users on how to recognise the threats, and use the security measures.
- In Europe, the regulations that govern the handling of data are GDPR (General Data Protection Regulation).
- In the USA, medical information is guarded by HIPAA (Health Insurance Portability and Accountability Act).
- The IT act 2000 in India addresses the electronic commerce and cybercrime.
- Complying with these laws not only makes it easier to do but also instills a sense of safety to people using digital systems.
- Security Analyst - Keeps watch of security breaches on systems and studies incidents.
- Security Engineer- Plants a secure network solution.
- Ethical Hacker- Scans systems to enhance its security.
- Chief Information Security Officer (CISO) is a primary person responsible over all the information security strategy of a company.