Thursday, April 25, 2019

Information Security Management ( Study Case ) Essay

cultivation Security Management ( Study Case ) - Essay practice sessionCharlie must adopt some personal strategy to make top management realize the need and signifi loaferce of education technology in their firm. He must explain them the benefits of adopting info shelter by comparing their firm with other firms. b) The almost important advice to Iris The most important advice is to make the top management escort the need for information security. From the illustration, it is understood that Random Widget Works gives the least priority to information security. Making the management understand its importance will let the management take initiatives for framing new policies and allocating ample resources to give security to data and information. C5 a) Confidential development Confidential Information denotes the documents that should not be sh atomic number 18d with anyone outside the organization. Example Documents that can be classified Confidential Strategic Planning Document Technical documents Information rough clients Sensitive Information Sensitive Information denotes the set of documents that require special attention and have to be prevented from unauthorized access, use or disclosure. Sensitive information can be either confidential or public. However, a high level of integrity is to be maintained in case of sensitive information (chapter 5). ... These documents are issued exclusively released with the intention of giving the public some information about the company. Example Documents that can be classified Public Profit and loss account rumor Balance sheet statement Registration details of the company b) Label scheme to associate with classification system The security tails are a must for all documents in order to get security clearance. Any security label has the following four components. Security Policy. Classification. Categories Privacy Mark There are contrastive labeling schemes followed by different organizations. However, for Rando m Widget works, the following schemes would be helpful. Confidential information Confidential documents must be terminus ad quem with white cover, with the text CONFIDENTIAL, stamped diagonally across the document in red color. Sensitive Information Sensitive information has to be covered with white wrapper with the text SENSITIVE stamped diagonally across the document in yellow color. Public Information Public documents may or may not have stamps labeled on them. However, a green color stamp will let the drug user easily identify that the document could be released for public use. C6 a) Incident or Disaster? The current happening was just an Incident as per Iriss point of view. According to our case, both Joel and Harry had relieve their documents and sent to the print server. There were 80% chances of recovery of data. This would have been called a disaster, if there were no chances of recovery of data. Had it been a disaster Iris would have delegated responsibilities to Harr y and Joel. Recovery of data holds great substance in organizations as most of the data are confidential and contains secure information that can compositors case a disaster

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.