Goal of the Security Policy
Organization X depends on information and information systems. The goal of the security policy is to set objectives for the organization as regards the protection of its informational assets. The security policy provides the basis for the implementation of security controls that reduce risks and system vulnerabilities. By clarifying the responsibilities of users and the measures they must adopt to protect information and systems, Organization X avoids serious losses or unauthorized disclosure. Moreover, the company's good name is partly dependant on the manner in which it protects its information and information systems. Finally, a security policy can be useful as evidence in litigations, in client contract negotiations, during acquisition bids and for business relations in general. The management of Organization X has initiated and continues to sustain an information security effort thanks to the development of sound policies and procedures.
Security Management Framework
All policies and procedures included in this document are approved, supported and defended by the senior management of Organization X. As respect of the security policy is all important to the corporation, its information and the information entrusted to it must be protected according to the critical value and sensitive nature of this information. Security measures must be taken, regardless of the storage media on which information is saved, the systems used to process information or the methods used to transfer information. Information must be protected according to its security classification, without regard to the phase of the information life cycle in which it is found.
Information security is a team effort. It requires the participation and support of all members of the organization who work with information systems. Thus, each employee must comply with the requirements of the information security policy and its... [continua]
Cite este ensayo
(2010, 10). Seguridad Informatica. BuenasTareas.com. Recuperado 10, 2010, de http://www.buenastareas.com/ensayos/Seguridad-Informatica/943845.html
"Seguridad Informatica" BuenasTareas.com. 10 2010. 2010. 10 2010 <http://www.buenastareas.com/ensayos/Seguridad-Informatica/943845.html>.
- MLA 7
"Seguridad Informatica." BuenasTareas.com. BuenasTareas.com, 10 2010. Web. 10 2010. <http://www.buenastareas.com/ensayos/Seguridad-Informatica/943845.html>.
"Seguridad Informatica." BuenasTareas.com. 10, 2010. consultado el 10, 2010. http://www.buenastareas.com/ensayos/Seguridad-Informatica/943845.html.