This document discusses various aspects of information security. It begins by explaining how recent events show that commercial, personal, and sensitive information is difficult to keep secure. An estimated 80% of data breaches are caused by staff rather than technical issues. Effective information security requires a management approach rather than just technical solutions. The document then outlines key principles of information security including confidentiality, integrity, authentication, non-repudiation, access control, and availability. It provides examples to illustrate these principles and how losses can occur when they are compromised or violated. Finally, it discusses the importance of security policies and techniques such as cryptography and authentication to help control threats and restrict unauthorized access.