Dealing
with technology designed to operate at high levels of performance
Specific conditions
Learning objective
Upon completion of this chapter you should be
able to:
– Understand the business need for information
security.
– Understand a successful information security
program is the responsibility of an
organization‘s general management and IT
management.
– Understand the threats posed to information
security and the more common attacks associated with those threats.
– Differentiate threats to information systems
from attacks against information
systems. Business Needs First, Technology Needs
Last
Information security performs four important
functions for an organization:
– Protects the organization‘s ability to function
– Enables the safe operation of applications
implemented on the organization‘s IT
systems
– Protects the data the organization collects and
uses
– Safeguards the technology assets in use at the
organization
Protecting the Ability to Function
Management
is responsible
Information
security is
– a management issue
– a people issue
Communities
of interest must argue for information security in terms of impact and cost
Enabling Safe Operation
Organizations
must create integrated, efficient, and capable applications
Organization
need environments that safeguard applications
Management
must not abdicate to the IT department its responsibility to make choices and
enforce decisions
Protecting Data
One
of the most valuable assets is data
Without
data, an organization loses its record of transactions and/or its ability to deliver
value to its customers
An
effective information security program is essential to the protection of the
integrity
and value of the organization‘s data
Safeguarding Technology AssetsTnlearners.com,edu.finstechnologies.com,webexpo Tnlearners.com,edu.finstechnologies.com,webexpo
Organizations must have
secure infrastructure services based on the size and scope of the enterprise
Additional
security services may have to be provided
More robust solutions may be needed to replace
security programs the organization has outgrown
No comments:
Post a Comment