Introduction 3
Literature Review-Information Security 3
Characteristics of Information 4
Availability 4
Authenticity 4
Confidentiality 5
Integrity 5
Threats and Vulnerabilities 5
Adversarial Sources and Events of Threat 6
Non-adversarial Sources and Events of Threat 6
Information Security Policy & Standards 7
ISO 27001 & CobIT Standards 8
Information Security Adoption in Oman: A Case S.....