{"id":38849,"date":"2021-08-17T13:04:28","date_gmt":"2021-08-17T05:04:28","guid":{"rendered":"https:\/\/version-2.com\/?p=38849"},"modified":"2021-09-25T11:37:53","modified_gmt":"2021-09-25T03:37:53","slug":"the-pillars-of-information-security-part-2","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2021\/08\/the-pillars-of-information-security-part-2\/","title":{"rendered":"The Pillars of Information Security \u2013 Part 2"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"38849\" class=\"elementor elementor-38849\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a9966c4 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a9966c4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;437ef7f&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2884b38\" data-id=\"2884b38\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-980bf1e post-content elementor-widget elementor-widget-text-editor\" data-id=\"980bf1e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p align=\"center\"><img decoding=\"async\" src=\"https:\/\/senhasegura.com\/wp-content\/uploads\/2021\/08\/The-Pillars-of-Information-Security-2-01.png\" alt=\"\" width=\"958\" height=\"auto\"><\/p>\n<p>Currently, the use of information is a great ally for companies from different industries. However, along with this, comes the need to protect this information with what is called information security. But do you know what the pillars of information security are?<\/p>\n<p>This article will address these pillars to bring greater clarification and knowledge on the topic, which is of great importance.<\/p>\n\n<h2><strong>Importance of Information Security<\/strong><\/h2>\n<p>Information security works to protect the data and information that a company has against external attacks and data theft. That is because, with technological transformation, the data that a company owns has become one of its most important and valuable assets.<\/p>\n<p>Also, concerning data from third parties, such as customers, it is essential to have protection for a company to work in compliance with the Brazilian legislation that deals with the matter.<\/p>\n<p>In this sense, the company must have excellent information security behavior, with strategies and mechanisms that are efficient and guarantee the integrity and complete security of all data.&nbsp;<\/p>\n<p>To guide the entire protection network, some pillars are used to obtain the maximum level of security.<\/p>\n<p>They are the following:<\/p>\n<ul>\n<li> Confidentiality;<\/li>\n<li> Integrity;<\/li>\n<li> Availability.<\/li>\n<\/ul>\n<p>In the following topics, take a look at what each of the pillars described above means to understand more how information security works.<\/p>\n\n<h2><strong>Learn More About Confidentiality<\/strong><\/h2>\n<p>With the Confidentiality pillar, information security works with limited access to the content of stored data. Access to information can only be allowed to authorized people.<\/p>\n<p>With that, not everyone can have unrestricted access, and the system is designed to open information exclusively under authorization.<\/p>\n\n<h2><strong>Learn More About Integrity<\/strong><\/h2>\n<p>In addition to the pillar above, Integrity is another one that must be respected so that information security is robust and adequate.<\/p>\n<p>In other words, integrity means that there must be confirmation that the information is truthful. For this, the pillar protects the data so that it is not tampered with or changed without the proper authorization of those who have access.<\/p>\n<p>Visit our website and find other articles like this one to learn more about information security and related topics of great importance!<\/p>\n\n<h2><strong>Learn More About Availability<\/strong><\/h2>\n<p>Furthermore, the third pillar is Availability, which states that, whenever necessary, data will be available for access. Of course, as the pillars are complementary, this one is only valid for authorized accesses.<\/p>\n<p>Therefore, it offers, within the system, the guarantee that data will not be deleted or relocated and that it can be requested and accessed by authorized people, entities, or processes when it is necessary to have access to the stored information.<\/p>\n<p>So, by integrating these three main pillars, an organization is robust and prepared to offer what the information needs in terms of security.<\/p>\n<p>When all pillars are in place, the company does not have the risk of losing data, suffering unwanted changes, or even theft or unwanted leaks.<\/p>\n<p>This is all thanks to the pillars guiding the protection system and that will work whenever something contrary to the guidelines is identified, such as in the case of an unauthorized person trying to gain access to information.<\/p>\n<p>Also, depending on the type of system created, whenever an attack attempt happens, it is recorded in the system so that further action can be taken, such as investigation and verification of where the found threat came from.<\/p>\n<p>With this, this type of system becomes even more secure and data is more protected.<\/p>\n<p>Therefore, it is through these pillars that companies must protect data they have and that is of great value to their activities and to prevent the law from being breached, especially in relation to customer data and information.<\/p>\n<p>That is because companies that keep personal customer information must maintain strict confidentiality and are responsible for protecting this data, under penalty of even suffering legal consequences.<\/p>\n<p>Thus, the use of information security is extremely important and must always be done carefully, using what is most developed in the industry, because it is one of the segments in which updates and the speed of monitoring must be compatible with the emergence of new systems.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a7b53ad elementor-widget elementor-widget-shortcode\" data-id=\"a7b53ad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18134\" class=\"elementor elementor-18134\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a909055 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"a909055\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4e3c0d4\" data-id=\"4e3c0d4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-10af45e elementor-widget elementor-widget-text-editor\" data-id=\"10af45e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About Segura\u00ae <\/strong><br \/>Segura\u00ae strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Currently, the use of information is a great ally for c [&hellip;]<\/p>\n","protected":false},"author":143524195,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[419,461,61],"tags":[420,462],"class_list":["post-38849","post","type-post","status-publish","format-standard","hentry","category-segura","category-year2021","category-press-release","tag-segura","tag-462"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Pillars of Information Security \u2013 Part 2 - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/version-2.com\/zh\/2021\/08\/the-pillars-of-information-security-part-2\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Pillars of Information Security \u2013 Part 2 - Version 2\" \/>\n<meta property=\"og:description\" content=\"Currently, the use of information is a great ally for c [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/version-2.com\/zh\/2021\/08\/the-pillars-of-information-security-part-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-17T05:04:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-09-25T03:37:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/senhasegura.com\/wp-content\/uploads\/2021\/08\/The-Pillars-of-Information-Security-2-01.png\" \/>\n<meta name=\"author\" content=\"version2hk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"version2hk\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/08\\\/the-pillars-of-information-security-part-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/08\\\/the-pillars-of-information-security-part-2\\\/\"},\"author\":{\"name\":\"version2hk\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\"},\"headline\":\"The Pillars of Information Security \u2013 Part 2\",\"datePublished\":\"2021-08-17T05:04:28+00:00\",\"dateModified\":\"2021-09-25T03:37:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/08\\\/the-pillars-of-information-security-part-2\\\/\"},\"wordCount\":689,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/08\\\/the-pillars-of-information-security-part-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/senhasegura.com\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/The-Pillars-of-Information-Security-2-01.png\",\"keywords\":[\"Segura\",\"2021\"],\"articleSection\":[\"Segura\",\"2021\",\"Press Release\"],\"inLanguage\":\"zh-HK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/08\\\/the-pillars-of-information-security-part-2\\\/\",\"url\":\"https:\\\/\\\/version-2.com\\\/2021\\\/08\\\/the-pillars-of-information-security-part-2\\\/\",\"name\":\"The Pillars of Information Security \u2013 Part 2 - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/08\\\/the-pillars-of-information-security-part-2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/08\\\/the-pillars-of-information-security-part-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/senhasegura.com\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/The-Pillars-of-Information-Security-2-01.png\",\"datePublished\":\"2021-08-17T05:04:28+00:00\",\"dateModified\":\"2021-09-25T03:37:53+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/08\\\/the-pillars-of-information-security-part-2\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/version-2.com\\\/2021\\\/08\\\/the-pillars-of-information-security-part-2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/08\\\/the-pillars-of-information-security-part-2\\\/#primaryimage\",\"url\":\"https:\\\/\\\/senhasegura.com\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/The-Pillars-of-Information-Security-2-01.png\",\"contentUrl\":\"https:\\\/\\\/senhasegura.com\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/The-Pillars-of-Information-Security-2-01.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/08\\\/the-pillars-of-information-security-part-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Pillars of Information Security \u2013 Part 2\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\",\"name\":\"version2hk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"caption\":\"version2hk\"},\"sameAs\":[\"http:\\\/\\\/version2xfortcom.wordpress.com\"],\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/version2hk\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Pillars of Information Security \u2013 Part 2 - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/version-2.com\/zh\/2021\/08\/the-pillars-of-information-security-part-2\/","og_locale":"zh_HK","og_type":"article","og_title":"The Pillars of Information Security \u2013 Part 2 - Version 2","og_description":"Currently, the use of information is a great ally for c [&hellip;]","og_url":"https:\/\/version-2.com\/zh\/2021\/08\/the-pillars-of-information-security-part-2\/","og_site_name":"Version 2","article_published_time":"2021-08-17T05:04:28+00:00","article_modified_time":"2021-09-25T03:37:53+00:00","og_image":[{"url":"https:\/\/senhasegura.com\/wp-content\/uploads\/2021\/08\/The-Pillars-of-Information-Security-2-01.png","type":"","width":"","height":""}],"author":"version2hk","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"version2hk","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"3 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/version-2.com\/2021\/08\/the-pillars-of-information-security-part-2\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2021\/08\/the-pillars-of-information-security-part-2\/"},"author":{"name":"version2hk","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db"},"headline":"The Pillars of Information Security \u2013 Part 2","datePublished":"2021-08-17T05:04:28+00:00","dateModified":"2021-09-25T03:37:53+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2021\/08\/the-pillars-of-information-security-part-2\/"},"wordCount":689,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/version-2.com\/2021\/08\/the-pillars-of-information-security-part-2\/#primaryimage"},"thumbnailUrl":"https:\/\/senhasegura.com\/wp-content\/uploads\/2021\/08\/The-Pillars-of-Information-Security-2-01.png","keywords":["Segura","2021"],"articleSection":["Segura","2021","Press Release"],"inLanguage":"zh-HK"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2021\/08\/the-pillars-of-information-security-part-2\/","url":"https:\/\/version-2.com\/2021\/08\/the-pillars-of-information-security-part-2\/","name":"The Pillars of Information Security \u2013 Part 2 - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/version-2.com\/2021\/08\/the-pillars-of-information-security-part-2\/#primaryimage"},"image":{"@id":"https:\/\/version-2.com\/2021\/08\/the-pillars-of-information-security-part-2\/#primaryimage"},"thumbnailUrl":"https:\/\/senhasegura.com\/wp-content\/uploads\/2021\/08\/The-Pillars-of-Information-Security-2-01.png","datePublished":"2021-08-17T05:04:28+00:00","dateModified":"2021-09-25T03:37:53+00:00","breadcrumb":{"@id":"https:\/\/version-2.com\/2021\/08\/the-pillars-of-information-security-part-2\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/version-2.com\/2021\/08\/the-pillars-of-information-security-part-2\/"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/2021\/08\/the-pillars-of-information-security-part-2\/#primaryimage","url":"https:\/\/senhasegura.com\/wp-content\/uploads\/2021\/08\/The-Pillars-of-Information-Security-2-01.png","contentUrl":"https:\/\/senhasegura.com\/wp-content\/uploads\/2021\/08\/The-Pillars-of-Information-Security-2-01.png"},{"@type":"BreadcrumbList","@id":"https:\/\/version-2.com\/2021\/08\/the-pillars-of-information-security-part-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"The Pillars of Information Security \u2013 Part 2"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db","name":"version2hk","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","caption":"version2hk"},"sameAs":["http:\/\/version2xfortcom.wordpress.com"],"url":"https:\/\/version-2.com\/zh\/author\/version2hk\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-a6B","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/38849","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/143524195"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=38849"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/38849\/revisions"}],"predecessor-version":[{"id":38853,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/38849\/revisions\/38853"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=38849"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=38849"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=38849"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}