Friday, December 20, 2019
A Brief Note On The Security Of Information - 1445 Words
Introduction Information is an aid to every single person, national/independent organization, logical investigations. Every activity depended on this stored information. There are different means of storage of information like files, documents and computer. But the digitalized storage of information in computer or computer network has become more efficient in maintenance, quick access of information, long life storages. Besides these advantages, there are also some challenging criteria in information digitalization. One of the major and major criteria is the security of that information. This Security of the information plays a major role in the business and its continuity. Not only in the areas of business, is security of informationâ⬠¦show more contentâ⬠¦Information Systems and its Implementing Strategies 3.1. Pre-defined Security policies and best practices A security Policy is the term referred as the strategy a company defined to analyze its critical assets and safeguarding principles of it. An organization or an individual must set up pre-defined and standard policies for security. It is purposed to determine the security assets and importance of protection to its employees. It should involve all the factors like ï⠧ Managing and maintaining of usernames, passwords. ï⠧ Response to a security instance. ï⠧ Secure way of using internet and internal e-mails. The initial step of an effective security policy lies in determining the employees and their responsibilities, use of the resources and how sensitive they must be handled, effective usage and restricted acts. These policies help in building up companyââ¬â¢s resources, its critical assets, methodologies and way of protecting them. 3.1.1. Revising of policies: These policies have to be revised to check whether the policies are understood by the staff and can be practically implemented or not. They should be reformed as per the need and necessity. They should clearly assign the roles and responsibilities of every employee, their privileges. 3.1.2. Policy Violation acts: The violation acts also must be defined intending to realize the value of security policy in case of violating the policy acts. So that the
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.