Chapter 8.2 focuses on the Information Security System, which is an integral part of an information system ensuring its operational security. It is distinct from business applications and encompasses various security mechanisms, including platform security, network management, and security services like authentication, integrity, and confidentiality. The security space in this context expands with the OSI model and features five core attributes: certification, permissions, integrity, encryption, and non-repudiation.