Friday, August 23, 2013

Need For Security


 Dealing with technology designed to operate at high levels of performance
Specific conditions
Learning objective
Upon completion of this chapter you should be able to:
– Understand the business need for information security.
– Understand a successful information security program is the responsibility of an
organization‘s general management and IT management.
– Understand the threats posed to information security and the more common attacks associated with those threats.
– Differentiate threats to information systems from attacks against information
systems. Business Needs First, Technology Needs Last
Information security performs four important functions for an organization:
– Protects the organization‘s ability to function
– Enables the safe operation of applications implemented on the organization‘s IT
systems
– Protects the data the organization collects and uses
– Safeguards the technology assets in use at the organization
Protecting the Ability to Function
 Management is responsible
 Information security is
– a management issue
– a people issue
 Communities of interest must argue for information security in terms of impact and cost
Enabling Safe Operation
 Organizations must create integrated, efficient, and capable applications
 Organization need environments that safeguard applications
 Management must not abdicate to the IT department its responsibility to make choices and enforce decisions
Protecting Data
 One of the most valuable assets is data
 Without data, an organization loses its record of transactions and/or its ability to deliver value to its customers
 An effective information security program is essential to the protection of the integrity
and value of the organization‘s data
Safeguarding Technology AssetsTnlearners.com,edu.finstechnologies.com,webexpo Tnlearners.com,edu.finstechnologies.com,webexpo
 Organizations must have secure infrastructure services based on the size and scope of the enterprise
 Additional security services may have to be provided
More robust solutions may be needed to replace security programs the organization has outgrown 

No comments:

Post a Comment