Information Security to Ensure Confidentiality, Integrity and Availability
According to Common Vulnerability Enumeration (CVE) database, there are 60,000+ common vulnerabilities,
900+ common weaknesses, 1014+ common configuration errors, over 150,000...
More
Information Security to Ensure Confidentiality, Integrity and Availability
According to Common Vulnerability Enumeration (CVE) database, there are 60,000+ common vulnerabilities,
900+ common weaknesses, 1014+ common configuration errors, over 150,000 security related events, and a
large number of application related errors.
This is enough to prove the dangerous environment in which
sensitive information and information systems of enterprises reside.
As the world transitioned from a paper based economy to a digital based one, enterprises today store
confidential business details which include personal staff details, client lists, salaries, bank account details,
marketing and sales information on computers.
This has made matters easy for the cyber criminals who use
the vulnerabilities in the software to gain access to a system or network.
Only through information security
that enterprises can protect sensitive information and information systems “from unauthorized access, use,
disclo
Less