This document outlines information and network security. It discusses security goals of confidentiality, integrity and availability. It defines information and information security. Information security aims to prevent unauthorized access, use, disclosure or modification of information. The document also discusses encryption and the symmetric cipher model. Encryption scrambles data using an encryption key so that only authorized parties can access the information. The symmetric cipher model involves plain text being encrypted into cipher text using a secret key, which is then decrypted back into the original plain text.