The information age went international in the 1980s. However, the fact is that a series of corresponding  trade protection weaknesses also came. For example, electronic mails argon widely applied in todays daily  feeling and business,  spell the virus of one computer connected to  some others in a honeycomb arrangement may  alter another, as usually how great they  atomic number 18 interconnected is unknown (Shain, 1996). Therefore, information     trade protection measure  body is increasingly required to take on a  easily vital role in networks. As Shain (1996) points out,  protective cover is a wide concept, it is a separated subject with its own theories, which  delegation on the process of attack and on preventing, detecting and   rule from attacks. Certainly, these processes should be well organized in coping with the   weighed down system issues. A coherent approach should be taken, which builds on established  protective cover standards, procedures and documentation. Actually   , the activities of the IT  guarantor function argon varying in accordance with the criteria of size and sector(Osborne, 1998). There are an amount of core activities, including: - Standards, procedures and documentation. - IT security policy creation and maintenance. -   be of capability. - Risk assessment. - Education and awareness. Firstly, The most widely recognized security standard is ISO 17799 (Information Security Policy World, 2001).

 Comprehensive analysis of security problems can be found in ISO 17799, especially followed by a large amount of control requirements, although some of which   guess quite diffic   ult to be put in   durable way. ISO 17799 co!   ntains different topics in its ten major sections. Next, two  to a greater extent than important topics will be emphasized ---policy and system maintenance. The IT security policy, like other policies of organizations or government, provides a guideline for the actions. The security policy will help the companies to achieve success in three ways (Dorey, 1996). Most importantly, security requirements for the corporation...                                        If you want to  overhear a full essay, order it on our website: 
OrderCustomPaper.comIf you want to get a full essay, visit our page: 
write my paper   
 
No comments:
Post a Comment