This document discusses information security and its various components. It defines information security as providing assurance that information risks and controls are balanced. It notes that every organization has information others may want to access or deny access to. The document outlines different types of security including physical, personal, operations, communications, network, and information security. It describes securing the different components of an information system and notes that perfect security is impossible, rather security must balance protection with reasonable access.