What is Security? (2024)

What is security?

Security for information technology (IT) refers to the methods, tools and personnel used to defend an organization's digital assets. The goal of IT security is to protect these assets, devices and services from being disrupted, stolen or exploited by unauthorized users, otherwise known as threat actors. These threats can be external or internal and malicious or accidental in both origin and nature.

An effective security strategy uses a range of approaches to minimize vulnerabilities and target many types of cyberthreats. Detection, prevention and response to security threats involve the use of security policies, software tools and IT services.

Unfortunately, technological innovation benefits both IT defenders and cybercriminals. To protect business assets, companies must routinely review, update and improve security to stay ahead of cyberthreats and increasingly sophisticated cybercriminals.

IT security consists of two areas: physical and information.

Physical security

Physical security is the protection of people, hardware, software, network information and data from physical actions, intrusions and other events that could damage an organization and its assets. Safeguarding the physical security of a business means protecting it from threat actors, as well as accidents and natural disasters, such as fires, floods, earthquakes and severe weather. A lack of physical protection could risk the destruction of servers, devices and utilities that support business operations and processes. That said, people are a large part of the physical security threat.

Theft and vandalism are examples of human-initiated threats that require physical security solutions. A physical security breach doesn't necessarily require technical knowledge, but it can be just as dangerous as a data breach.

There are three parts to physical security:

The success of an organization's physical security program depends on effectively implementing, maintaining and updating each of these components.

Access control

Controlling access to office buildings, research centers, laboratories, data centers and other locations is vital to physical security. An example of a physical security breach is an attacker gaining entry to an organization and using a Universal Serial Bus (USB) flash drive to copy and steal data or put malware on the systems.

The goal of access control is to record, monitor and limit the number of unauthorized users interacting with sensitive and confidential physical assets. Access control can be as simple as barriers like walls, fences and locked doors. Identification badge and keycodes are also part of an effective physical access system. Physical identification is a great way to authenticate the identity of users attempting to access devices and areas reserved for authorized personnel.

More sophisticated access control methods include various forms of biometric authentication. These security systems use biometrics, or unique biological characteristics, to authenticate the identity of authorized users. Fingerprint and facial recognition are two examples of common applications of this technology.

Surveillance

Surveillance involves the technologies and tactics used to monitor activity in and around facilities and equipment. Many companies install closed-circuit television cameras to secure the perimeter of their buildings. These cameras act as both a deterrent to intruders and a tool for incident response and analysis. Cameras, thermal sensors, motion detectors and security alarms are only some examples of surveillance technology.

Testing

Testing is a reliable way to increase physical security. Companies that have strong security protocols test their policies to see if they need to be updated or changed. Such tests can include red teaming, where a group of ethical hackers try to infiltrate a company's cybersecurity protocols.

Information security

Information security is also referred to as infosec. It includes strategies used to manage the processes, tools and policies that protect both digital and nondigital assets. When implemented effectively, infosec can maximize an organization's ability to prevent, detect and respond to threats.

Infosec encompasses several specialized categories of security technology, including:

Application security to protect applications from threats that seek to manipulate, access, steal, modify or delete software and its related data. Application security uses a combination of software, hardware and policies that are called countermeasures. Common countermeasures include application firewalls, encryption, patch management and biometric authentication systems.

Cloud security is a set of policies and technologies designed to protect data and infrastructure in a cloud computing environment. Two key concerns of cloud security are identity and access management and data privacy. Penetration testing, network protocol maintenance, man-in-the-middle (MitM) detection and application scanning are some tools infosec professionals use to secure the confidentiality of information.

What is Security? (1)

Cloud security is a responsibility that is shared by the cloud service provider (CSP) and the tenant, or the business that rents infrastructure such as servers and storage. A legal gray zone in cloud security can occur if CSP agreements are not well constructed. For example, if a tenant's server is compromised by cybercriminals who gain access to another tenant's server, it can be clear who is to blame?

Endpoint security requires network nodes meet certain security standards, like the Federal Information Security Modernization Act, prior to establishing a secure connection. Node devices include personal computers, laptops, tablets, smartphones and equipment such as point-of-sale terminals, barcode readers, sensors and internet of things (IoT) devices.

Internet security is the protection of software applications, web browsers and virtual private networks that use the internet. Techniques such as encryption, for example, protect data from attacks such as malware, phishing, MitM and denial-of-service attacks.

Mobile security is referred to as wireless security. It protects mobile devices, such as smartphones, tablets and laptops, and the networks they connect to from theft, data leakage and other attacks.

Network security defends the network infrastructure and the devices connected to it from threats such as unauthorized access, malicious use and modifications.

What is Security? (2)

Supply chain security protects the network between a company and its suppliers who often have access to sensitive information such as employee information and intellectual property. The SolarWinds data breach in 2020 demonstrated how vulnerable organizations can be when supply chain channels are poorly monitored. SolarWinds is an IT company that manages client networks and systems and has access to the customers' IT. Once hackers infiltrated SolarWinds' update server, they were able to install a virus that acted as a digital backdoor to client systems and data.

Information technology security concepts and principles

A number of concepts and principles form the foundation of IT security. Some of the most important ones are:

  • Application lifecycle management. This protects all stages of the application development process by reducing exposure to bugs, design flaws and configuration errors.
  • Defense in depth. This is a strategy that uses multiple countermeasures simultaneously to protect information. These methods can include endpoint detection and response, antivirus software and kill switches. Defense in depth is based on the military principle that it's more difficult for an enemy to beat a multilayered defense system than a single-layer one.
  • Patch management. Patches and updates are acquired, tested and installed for flawed code in applications, operating systems and firmware.
  • Principle of least privilege. This principle strengthens IT security by limiting user and program access to the lowest level of access rights needed for them to do their jobs or functions.
  • Risk management. This is the process of identifying, assessing and controlling security risks that threaten an organization's IT environment.
  • Vulnerability management. With this approach, security admins routinely check for vulnerabilities by identifying, verifying, mitigating and patching IT security weaknesses as they arise.
What is Security? (3)

These are some of the most important concepts and principles of IT security and technology. However, combining all these principles doesn't guarantee 100% security for an organization. This is a fundamental problem facing every IT security leader and business. However, by deploying a comprehensive security strategy, organizations can defend against physical security and infosec threats.

What is Security? (4)

Cybersecurity vs. infosec

Considering information security's intersection with endpoint, IoT and network security, it can be difficult to separate information security from cybersecurity; however, there are distinct differences. One difference is geopolitical issues. Cybersecurity can refer to the defense mechanisms that protect a country or a government's data from cyberwarfare. This is because cybersecurity includes the protection of data and its related technologies from threats.

Information security, on the other hand, focuses on ensuring information is available, remains confidential and maintains its integrity.

Learn more about the threats to information security that enterprise IT is facing today.

This was last updated in June 2021

Continue Reading About security

Related Terms

What is a quality gate?
A quality gate is a milestone in an IT project that requires that predefined criteria be met before the project can proceed to ...Seecompletedefinition
What is exposure management?
Exposure management is a cybersecurity approach to protecting exploitable IT assets.Seecompletedefinition
What is the Coalition for Secure AI (CoSAI)?
Coalition for Secure AI (CoSAI) is an open source initiative to enhance artificial intelligence's security.Seecompletedefinition

Dig Deeper on Risk management

What is Security? (2024)

FAQs

What is the answer to the security question? ›

1. Safe: Ensure that the answer to your security question is confidential and cannot be easily guessed by others. For example, avoid using information in your answers that someone can find by searching your digital footprint such as your birthdate or street address.

What is security in short answer? ›

Security means safety, as well as the measures taken to be safe or protected. In order to provide adequate security for the parade, town officials often hire extra guards. A small child will sometimes latch on to a blanket or stuffed animal that gives him or her the feeling of security.

What is IT security in simple words? ›

IT security, which is short for information technology security, is the practice of protecting an organization's IT assets—computer systems, networks, digital devices, data—from unauthorized access, data breaches, cyberattacks and other malicious activity.

What are some security questions and answers? ›

Here are examples of some common security questions:
  • In what city were you born?
  • What is the name of your favorite pet?
  • What is your mother's maiden name?
  • What high school did you attend?
  • What was the name of your elementary school?
  • What was the make of your first car?
  • What was your favorite food as a child?
Jul 26, 2022

What do you write in a security answer? ›

To ensure you have a strong password, you should include uppercase and lowercase letters, numbers, and symbols. Your security answer should be something memorable for you, but not easy for someone to guess or find online.

Why do I have to answer security questions? ›

Security questions are usually used by banks, online services, etc. The purpose of asking such questions is to add another layer of security alongside your password.

What security means to me? ›

Security means that you have the peace of mind knowing that when you are not home you don't have to worry that an outside force is not damaging or destroying what you value the most.

How would one define security? ›

: something that secures : protection. b(1) : measures taken to guard against espionage or sabotage, crime, attack, or escape. (2) : an organization or department whose task is security.

What is the best definition of security? ›

1. the state of being or feeling secure; freedom from fear, anxiety, danger, doubt, etc.; state or sense of safety or certainty. 2. something that gives or assures safety, tranquillity, certainty, etc.; protection; safeguard. 3.

What describes security? ›

Security is protection from, or resilience against, potential harm (or other unwanted coercion). Beneficiaries (technically referents) of security may be persons and social groups, objects and institutions, ecosystems, or any other entity or phenomenon vulnerable to unwanted change.

What is a security simple? ›

The term "security" is defined broadly to include a wide array of investments, such as stocks, bonds, notes, debentures, limited partnership interests, oil and gas interests, and investment contracts.

What is being a security? ›

A private security officer's responsibility is protecting their client from a variety of hazards (usually in the form of criminal acts). Security personnel enforce company rules and can act to protect lives and property, and they sometimes have a contractual obligation to provide these actions.

How can I answer security question? ›

Pretend you are someone else when answering the questions.

Make sure you remember who you pretended to be, or write it down somewhere safe. 5. If you use a password manager (e.g. KeePass, LastPass), use answers that have nothing to do with you personally and store them along with your account information.

What are the three things of security? ›

The Foundation of Security. Comprehensive security is the key to any organization. There are three categories of security controls that businesses must consider: management security, operational security, and physical security. Each type is important for overall security and to protect against threats.

What are the 4 fundamentals of security? ›

Fundamental Principles of Information Security

There are four main principles of information security: confidentiality, integrity, availability, and non-repudiation.

How do you pass a security question? ›

The security question should be factual and not change over time. For example, your preferred musical genre, favorite song, or work address might change, but the city you were born in won't. Unpredictable. Don't make the answer something others can easily guess or research.

What is a secret question answer? ›

Secret questions usually ask for an obscure fact that hopefully only the account owner would know and supposedly would never forget. Many Web sites assume that the user providing the answer to the question is sufficient to identify the user.

What does security question and answer mean? ›

Security Question & Answer means an answer used to verify the identity of a User when the User resets the User's Compliant Password. Sample 1.

What to do when you forgot the answer to your security question? ›

Try the most likely answers you would have given. If the first attempt does not succeed, try again. Keep trying the most logical answers to your security questions.

Top Articles
The New InterWell Health – A Unique Opportunity to Transform Value Based Kidney Care
Medieval Pack
Fan Van Ari Alectra
Joi Databas
Moon Stone Pokemon Heart Gold
1970 Chevelle Ss For Sale Craigslist
Craigslist Benton Harbor Michigan
Crocodile Tears - Quest
Top 10: Die besten italienischen Restaurants in Wien - Falstaff
Northern Whooping Crane Festival highlights conservation and collaboration in Fort Smith, N.W.T. | CBC News
Hertz Car Rental Partnership | Uber
Dr Doe's Chemistry Quiz Answer Key
Samsung 9C8
Gw2 Legendary Amulet
Kentucky Downs Entries Today
Slapstick Sound Effect Crossword
Valentina Gonzalez Leaked Videos And Images - EroThots
Olivia Ponton On Pride, Her Collection With AE & Accidentally Coming Out On TikTok
Brenna Percy Reddit
Osrs Blessed Axe
Pro Groom Prices – The Pet Centre
Pvschools Infinite Campus
R/Afkarena
Beau John Maloney Houston Tx
Directions To 401 East Chestnut Street Louisville Kentucky
Does Breckie Hill Have An Only Fans – Repeat Replay
Parent Resources - Padua Franciscan High School
Who called you from +19192464227 (9192464227): 5 reviews
Why Is 365 Market Troy Mi On My Bank Statement
Divide Fusion Stretch Hoodie Daunenjacke für Herren | oliv
Cona Physical Therapy
Dexter Gomovies
Craigslist Efficiency For Rent Hialeah
Ts Modesto
Uky Linkblue Login
Microsoftlicentiespecialist.nl - Microcenter - ICT voor het MKB
1400 Kg To Lb
Shnvme Com
Weekly Math Review Q4 3
Marine Forecast Sandy Hook To Manasquan Inlet
Today's Final Jeopardy Clue
Manatee County Recorder Of Deeds
The Transformation Of Vanessa Ray From Childhood To Blue Bloods - Looper
All-New Webkinz FAQ | WKN: Webkinz Newz
Valls family wants to build a hotel near Versailles Restaurant
Jammiah Broomfield Ig
Alba Baptista Bikini, Ethnicity, Marriage, Wedding, Father, Shower, Nazi
Verizon Forum Gac Family
Ajpw Sugar Glider Worth
Rick And Morty Soap2Day
Frank 26 Forum
Room For Easels And Canvas Crossword Clue
Latest Posts
Article information

Author: Kerri Lueilwitz

Last Updated:

Views: 5384

Rating: 4.7 / 5 (47 voted)

Reviews: 86% of readers found this page helpful

Author information

Name: Kerri Lueilwitz

Birthday: 1992-10-31

Address: Suite 878 3699 Chantelle Roads, Colebury, NC 68599

Phone: +6111989609516

Job: Chief Farming Manager

Hobby: Mycology, Stone skipping, Dowsing, Whittling, Taxidermy, Sand art, Roller skating

Introduction: My name is Kerri Lueilwitz, I am a courageous, gentle, quaint, thankful, outstanding, brave, vast person who loves writing and wants to share my knowledge and understanding with you.