AllFreePapers.com - All Free Papers and Essays for All Students
Search

Information Security Management

Autor:   •  February 25, 2014  •  Research Paper  •  8,117 Words (33 Pages)  •  1,682 Views

Page 1 of 33

1. INTRODUCTION

1.1. Team Formation

1.2. Core Business

The main business of the company is software and hardware development for use in processing Geoscience information of clients who are in Oil & Gas sector. The company has 40% of market share and in the midst of developing an innovative solution to transform itself as a market leader.

1.3. Description of Information Technology and System Components

There are 2 main areas of focus in Company's Information System namely:

• Infrastructure that provide telecommunication, network and servers

• Data processing that is a strategic segment of IS which delivers core Geoscience data processing

1.4. Information Security Master Plan Outline

1.4.1. Information Security

Computer security is responsible for protecting computer systems. This usually refers to techniques for ensuring that data stored in a computer cannot be read or modified by any unauthorised individuals. This involves encrypting of files and using passwords to authenticate the users who are trying to access the files. Information technology, on the other hand, refers to the protection of information and information systems against unauthorised access or modification of information. Regardless if it is in storage, processing, or transit, and against denial of service to authorised users. Information security includes those measures necessary to detect, document, and counter such threats in order to maintain the information's confidentiality, integrity and availability.

• Confidentiality: Ensure that the information can only be accessed and read by authorised personnel, which also means that the information is safeguarded against unauthorised access or modifications.

• Integrity: Assurance that the information is authentic and complete and that the integrity of the information has not been compromised by ensuring that they are accurate and have not been modified or altered by any unauthorised personnel.

• Availability: Ensure that the systems that are responsible for providing information are accessible when needed and that authorised personnel can gain access to the information whenever they have the need to do so.

1.1.1. The Role of Leaders and Management in Security

The main differences between leadership and management are that leadership equip leaders with the ability to influence, motivate and enable their followers to contribute towards the success of the organisation through the appeal of their hearts. Leadership has power through

...

Download as:   txt (61 Kb)   pdf (616.7 Kb)   docx (32.4 Kb)  
Continue for 32 more pages »