Information Security Models: Architecture & Governance

Instructor: David Gloag

David has over 40 years of industry experience in software development and information technology and a bachelor of computer science

The information we use in the course of a day is important, and so is securing that information. In this lesson, we'll take a look at information security, and how models, architecture, and governance are related.

Protect What is Valuable

Information is valuable. Just look at how much any business consumes, and you'll quickly see why. Burger King records customer preferences in an effort to identify that next big taste fad, Best Buy tracks consumer buying habits in an effort to predict stock levels, and Amazon collects online purchase transactions in an effort to determine if they are profitable. Is it any wonder that these companies, and others like them, are very concerned about their information? Certainly not. In fact, it is to be expected. But if the information is so important shouldn't they be working hard to protect it? Yes, and they do. They employ techniques and technologies from an area called information security.

What is Information Security?

Information security is the umbrella term used to describe the collection of processes and technologies employed to protect information. Specifically, it focuses on identifying, eradicating, and resisting attempts to compromise a company's information. You probably expect that this isn't trivial, and you'd be right. It requires a diverse set of technologies given the various places information is used and resides. For example, they can be as simple as a lock and key, or as complex as some of the biometric scans currently available. It really depends on the importance of the information being protected, and the money the company is willing to spend.

What is an Information Security Model?

An information security model is a template that describes how information security should be laid out and governed within an organization. Think of it like having a game plan. It includes a description of the overall information security process, the architecture which we'll talk about in a subsequent section, and the governance which we'll also talk about in a subsequent section. Taken together, these steps provide a comprehensive means to create and administer information security.

What is an Information Security Model Architecture?

An information security model architecture is the part of the information security model that describes the overall organization or layout of the information security model. It details the information accessible, where it is located, and the technologies used to secure it. Think of it like the blueprint for a building. You can see the framework, the location of windows and doors, and the relative distances between the main features of the building. An information security model architecture mimics this in many ways.

What is Information Security Model Governance?

Information security model governance, or policy, describes the rules that will be followed when implementing and enforcing information security model. In particular, it determines:

To unlock this lesson you must be a Member.
Create your account

Register to view this lesson

Are you a student or a teacher?

Unlock Your Education

See for yourself why 30 million people use

Become a member and start learning now.
Become a Member  Back
What teachers are saying about
Try it now

Earning College Credit

Did you know… We have over 220 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.

To learn more, visit our Earning Credit Page

Transferring credit to the school of your choice

Not sure what college you want to attend yet? has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.

Create an account to start this course today
Used by over 30 million students worldwide
Create an account