answersLogoWhite

0


Best Answer

Where computer security deals with the processes applied to computer system(s), information security concerns all of the aspects regarding the system of policies and/or procedures for identifying, controlling, and protecting information from unauthorized disclosure. While often synonymous, information security is actually a superset of computer security, encompassing the fields of data security, transmission security, network security, physical security, personal security, and personnel security,

User Avatar

Wiki User

9y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: 1 What is the defining difference between computer security and information security?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Difference between network and operating system security?

Network security concentrates on the packets of information flowing between computer systems.Operating System security controls access to resources on the server itself.Therefore, the two are looking at different things in terms of security.


What has the author Thomas R Peltier written?

Thomas R. Peltier has written: 'Policies & procedures for data security' -- subject(s): Electronic data processing departments, Security measures, Computer security 'Complete Guide to CISM Certification' 'Information security fundamentals' -- subject(s): Computer security, Data protection, Computer Technology, Nonfiction, OverDrive 'Information security risk analysis' -- subject(s): Computer networks, Security measures, Computer security, Risk assessment 'Information Security Fundamentals On-line Self-study Course'


Which websites can you visit to get information about computer security risks?

norton.


Give the ten example of cause and effect?

The information was easily stolen(effect) There were no security checks in the computer(cause) The information was easily stolen due to lack of security checks in the computer.


Where can one find more information about home computer security?

Trend Micro, Web Root, Cyber Security, On Guard Online, Corero, and Norton all offer additional information about home security as well as offer free and paid computer security.


What has the author Frederick B Cohen written?

Frederick B. Cohen has written: 'A collection of short papers on information protection' 'Protection and security on the information superhighway' -- subject(s): Security measures, Information superhighway, Computer networks, Computer security, Data protection


What has the author James A Schweitzer written?

James A. Schweitzer has written: 'Protecting information in the electronic workplace' -- subject(s): Access control, Computers, Electronic data processing departments, Security measures 'Computers, business, and security' -- subject(s): Computer security, Electronic data processing departments, Industries, Security measures 'Managing information security' -- subject(s): Business intelligence, Computer security, Electronic data processing, Electronic data processing departments, Security measures 'Computer crime and business information' -- subject(s): Computer crimes, Electronic data processing departments, Information resources management, Security measures


How has computer security evolved into modern information security in pdf?

Computer security in the earlier days was concerned primarily with controlling access to the computer system itself. In today's modern era data is a commodity that everyone wants, so confidentiality is a way to control access to information. Information security has to control who has access to data, and this is not just via the computer or the network. So to answer the question, it started with computer access and evolved to ways of protecting confidential data that may be retrieved or accessed anywhere, not just via the computer.


What has the author Adam Cobb written?

Adam Cobb has written: 'Australia's vulnerability to information attack' -- subject(s): Security measures, Computer security, Access control, Computer networks, Computers, Information networks


What are the different sources of system vulnerability and or abuse?

computer security and information assuarance


What is the Role of a IT Security Manager?

The IT Security Manager is responsible for defining the Information Security Policy and establishing the ISMS. Once these are in place, it is the IT Security Manager's job to ensure that all the proper controls are in place, people are aware of the policy and their responsibilities and that the security system is functioning correctly. The IT Security Manager is the focal point for all security issues.


How can I find out my computer's security network info?

To find out specific information about your computers network security you can contact your network admin