1. introduction
Goal of the Security Policy
Organization X depends on information and information systems. The goal of the security policyis to set objectives for the organization as regards the protection of its informational assets. The security policy provides the basis forthe implementation of security controls that reduce risks and system vulnerabilities. By clarifying the responsibilities of users and themeasures they must adopt to protect information and systems, Organization X avoids serious losses or unauthorized disclosure. Moreover, the company'sgood name is partly dependant on the manner in which it protects its information and information systems. Finally, a security policy can beuseful as evidence in litigations, in client contract negotiations, during acquisition bids and for business relations in general. The managementof Organization X has initiated and continues to sustain an information security effort thanks to the development of sound policies andprocedures.
Security Management Framework
All policies and procedures included in this document are approved, supported and defended by the seniormanagement of Organization X. As respect of the security policy is all important to the corporation, its information and the informationentrusted to it must be protected according to the critical value and sensitive nature of this information. Security measures must be taken, [continua]

Leer Ensayo Completo

Cite este ensayo

APA

(2010, 10). Seguridad informatica. BuenasTareas.com. Recuperado 10, 2010, de http://www.buenastareas.com/ensayos/Seguridad-Informatica/943845.html

MLA

"Seguridad informatica" BuenasTareas.com. 10 2010. 2010. 10 2010 <http://www.buenastareas.com/ensayos/Seguridad-Informatica/943845.html>.

MLA 7

"Seguridad informatica." BuenasTareas.com. BuenasTareas.com, 10 2010. Web. 10 2010. <http://www.buenastareas.com/ensayos/Seguridad-Informatica/943845.html>.

CHICAGO

"Seguridad informatica." BuenasTareas.com. 10, 2010. consultado el 10, 2010. http://www.buenastareas.com/ensayos/Seguridad-Informatica/943845.html.