Timeline of the History of Information Security
Summary
Information can be private or public, personal or generic, valuable or commonplace, online or offline. Like any other asset, it has to be protected. This is more important online where hackers can steal or misuse information remotely even without any physical access to where that information resides.
In line with evolving technology, data security practices have evolved from high-level principles into more detailed set of practices and checklists. In practice, there's no single list of principles that everyone agrees on. Many lists exist, each one customized for its context.
Source: sangeetha-prabhu and arvindpdmn, https://devopedia.org/information-security-principles
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 License.