Whether it is a home user, a small business or a larger corporation we depend on computer systems for processing information. This can be anything from a simple internet search, online banking, or the latest design for a new product. The loss or misuse of this information can cause irreversible damage for a business or home user.
Every computer is a potential host for vulnerabilities. The more accessible it is, the more it is susceptible to attack. Connecting to a network such as the Internet makes it potentially accessible to everyone on the network. We want the advantages of Internet access, but we also need to limit our exposure to unauthorized users.
Wikipedia, defines Information security as the process of protecting data from unauthorized access, use, disclosure, destruction, modification, or disruption. The terms information security, computer security and information assurance are frequently used interchangeably. These fields are interrelated and share the common goals of protecting the confidentiality, integrity and availability of information.
Read the full article at (http://en.wikipedia.org/wiki/Information_security)
According to the 2006 CSI/FBI Computer Crime and Security Survey:
The goal of the Computer and Information Systems Security program is to provide the workforce trained individuals to protect computer systems and networks used to process information.