Contents
Introduction 3
Literature Review-Information Security 3
Characteristics of Information 4
Availability 4
Authenticity 4
Confidentiality 5
Integrity 5
Threats and Vulnerabilities 5
Adversarial Sources and Events of Threat 6
Non-adversarial Sources and Events of Threat 6
Information Security Policy & Standards 7
ISO 27001 & CobIT Standards 8
Information Security Adoption in Oman: A Case Study 9
Analysis/Issues 10
Discussion/Solutions 11
Conclusion 13
References 14
Description
Security refers to quality or state of being secure and free from danger. It is the protection against adversaries from those who would harm, intentionally or otherwise the assets, resources and people (Alhassan & Adjei-Quaye, 2017). The increased growth of use of computers and other electronic devices that use internet connects millions of unsecured networks and they are in continuous communication with each other (Horne et al., 2015). In recent years, there is growing awareness of need to improve the information security and its importance for national defense. There is growing threat of cyber-attacks, which has led to government and companies becoming aware of the need to defend the computer-controlled systems of utilities and other critical and important infrastructure (Andress, 2014). This paper discusses growing importance of information security and its adoption in Oman.