This document discusses information security and cryptography. It defines information security as protecting data from unauthorized access, use, disclosure, disruption or destruction. Cryptography is used in information security to protect data confidentiality, integrity and availability through techniques like encryption, decryption, digital signatures and encrypted network communications. The document also discusses different types of cryptographic schemes like symmetric and asymmetric encryption, hash functions, and provides examples of widely used cryptography applications like PGP.