Information Security: Goals, Types and Applications