Chapter 12: Introduction to Security  What is “information security?”

Chapter 12: Introduction to Security

Introduction to security

Information is an asset to your company, and possibly your company's greatest asset. Information needs protection just like any other asset. Your company locks its doors at the end of the day, allowing only employees with a key to the building to enter. Similarly, your company needs to determine how best to protect the information contained in the databases, and who has access to the information.

In the past, organizations relied on physical separation and dedicated systems to ensure that sensitive information did not fall into the wrong hands. However, this approach is inadequate because of significant hardware and software costs, and the inability to meet operational requirements. As a counter-measure, individual database server need strong, yet flexible, security support.

Users and the data they access can be anywhere in the world, connected by untrusted networks, and ensuring the confidentiality and integrity of sensitive data and transactions in this environment is critical. The same systems that allow users to access the data from anywhere in the world also open up the information for users who should not have access to the information.

Information is only useful if it gets to the people who need it, when they need it, regardless of where they are. With complex and dynamically changing business relationships, it is critical that information gets only to authorized users.





Copyright © 2005. Sybase Inc. All rights reserved. What is “information security?”

View this book as PDF