Monday, June 17, 2019

It security Case Study Example | Topics and Well Written Essays - 750 words

It security - Case Study ExampleIt largely depends on IT infrastructural resources and assets for the conclusion of its transactions and operations.The average drug users of the system include the IT administrators and the staff, most of which posses above average computer literacy. The staff basically requires a computer running on a UNIX platform networked to the companys server especially those located at the satellite offices across the country.Security policy is the most crucial element of a companys security program given that it entails all the rules and procedures that must be adhered in order to ensure information security the integrity, confidentiality and availability of selective information 1.It is the policy of DechTech Solutions that information, in all forms, is protected from unauthorized modification, destruction or disclosure in order to ensure the integrity, confidentiality and availability of data to all the employees and the and different users.The Chief Info rmation Officer (CIO) alongside the Information Security Officer (ISO) has the primary responsibility for the policy implementation and assuring compliance. They work closely with owners, user management and custodians in development and implementation of the security policies of DechTech Solutions.Their responsibilities include the proviso of basic support for users and systems, ensuring that DechTech Solutions security procedures, policies and standards are in place and are adhered to, the provision of advice to owners in the identification and classification of computer resources, performing security audits, advising system development owners in the implementation of security controls, providing employee security education and providing regular reports DechTech lapse committee on information security.Information owner, the manager responsible for the creation of information and is usually the primary user1, is responsible for authorizing access and assigning

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.