This document reviews information security issues and techniques. It summarizes studies on information security, cyber security, the Internet of Things (IoT), and network security. The document outlines how these domains are impacted by various factors and attacks. It also describes security requirements that can help reduce vulnerabilities, such as confidentiality, integrity, and availability measures. Maintaining information security is important as companies increasingly rely on distributed systems and network communication.