The result of this concept is to try to abolish a threat when an attack or disaster is changed into. Already the protection, has for objective to implant security politics to inhibit, to detect and to protect any attempt of attack to the system of information of the organization (PIG, 2005). In accordance with It hisses (2003), the main points for implantation of the security of the information must follow the five basic principles: The relation cost and benefit: to guarantee investments for the favorable implementation and the maintenance, and the return that provides to the prevention and the protection of the information system. Such situation alone is remembered by the proprietors when a great disaster or attack occurs and the cost of restoration of the information of the databases many times, it is bigger of what it had invested months in a system of security of the safe and steady information.
The beginning of the concentration: it provides to the possibility of if managing the measures necessary of security of the information to take care of to necessities of improvement of protection of different sensible databases the alterations. The beginning of the protection in depth: it provides measures of security protection (physical or logical) as cameras of monitoring, biometria and recognition of voice. The use of this principle prevents a set of distinct and doubtful measures of protection for not becoming an inefficient and slow addition of obstacles for surrounding the safest one. The beginning of the consistency: it determines that the measures of protection of ITSELF possess one level of interchangeable sensitivity so that they reduce the imperfections of the programs of security of the organizations. Its use in such a way reaches at every level accesses of the information system as physicist or logical, for example, to hinder that a 7 son of one partner of the organization installs games, has access improper pages with the server of the company or to allow not authorized people to have access to the computers of the organization.