Over the past few weeks I have spent many hours thinking about my personal information security requirements and discussing pros and cons with others. My goal with this article is to clarify few concepts that have surfaced in these discussions. I want to help you find your way in the jungle of information security.