Network security and application security are sister practices to infosec, focusing on networks and app code, respectively. Obviously, there's some overlap here. You can't secure data transmitted across an insecure network or manipulated by a leaky application. As well, there is plenty of information that isn't stored discover more here electronically that also needs to be protected. Thus, the infosec pro's remit is necessarily broad. The basic components of information security are most often summed up by the so-called CIA triad: confidentiality, integrity, and availability. Confidentiality
... Continue reading