Information Security: Components and Techniques