Prague, Czech Republic

Mathematical Methods of Information Security

Master's
Language: EnglishStudies in English
Subject area: mathematics and statistics
Years of study: 2
University website: www.cuni.cz
Information
Information is any entity or form that provides the answer to a question of some kind or resolves uncertainty. It is thus related to data and knowledge, as data represents values attributed to parameters, and knowledge signifies understanding of real things or abstract concepts. As it regards data, the information's existence is not necessarily coupled to an observer (it exists beyond an event horizon, for example), while in the case of knowledge, the information requires a cognitive observer.
Information Security
Information security, sometimes shortened to InfoSec, is the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information. It is a general term that can be used regardless of the form the data may take (e.g., electronic, physical). Information security's primary focus is the balanced protection of the confidentiality, integrity and availability of data (also known as the CIA triad) while maintaining a focus on efficient policy implementation, all without hampering organization productivity. This is largely achieved through a multi-step risk management process that identifies assets, threat sources, vulnerabilities, potential impacts, and possible controls, followed by assessment of the effectiveness of the risk management plan.
Security
Security is freedom from, or resilience against, potential harm (or other unwanted coercive change) from external forces. Beneficiaries (technically referents) of security may be persons and social groups, objects and institutions, ecosystems, and any other entity or phenomenon vulnerable to unwanted change by its environment.
Information
Data, seeming facts, apparent asso­ciations-these are not certain knowledge of something. They may be puzzles that can one day be explained; they may be trivia that need not be explained at all.
Kenneth Waltz, Theory of International Politics (1979), Ch. 1 : Laws and Theories
Security
From that point, my universe went on crumbling; new cracks appeared all the time. I could see that the pleasant securities of childhood, all of those warm little human emotions, all of those trivial aims and purposes that we allow to rule our lives, were an illusion. We were like sheep munching grass, unaware that the butcher's lorry is already on its way. I got used to living with a deep, underlying feeling of uncertainty that no one around me seemed to share. It was rather like living on death row.
Colin Wilson in Alien Dawn, pp. 12-13 (1998)
Security
[T]he production of security should, in the interests of the consumers of this intangible commodity, remain subject to the law of free competition.  …  [N]o government should have the right to prevent another government from going into competition with it, or to require consumers of security to come exclusively to it for this commodity.
Gustave de Molinari, tr. J. Huston McCulloch, §II of The Production of Security (Auburn, AL: Ludwig von Mises Institute, 2009; orig. 1849), pp. 22–23.
Privacy Policy