State of the art in applied cryptography vol:1528 pages:377-393
The nineties set off the "information age". Companies, organisations, the whole society have become utterly dependent on computers for their proper functioning. Since information gathering, processing and distributing have become so important, it should be treasured as a strategic asset, and therefore, properly protected. In this paper, we first focus on the security policy. Then we examine the major threats that may compromise the security of information systems. Finally, we present an overview of security measures is presented.