This story appe atomic number 18d on Information Management Journal at hypertext transfer protocol://www.entrepreneur.com/tradejournals/article/print/189486076.html Nov-Dec, 2008 How to create a security measures last in your organization: a new study reveals the impressiveness of assessment, incident response procedures, and social engineer testing in improving security awake(predicate)ness programs. by Rotvold, Glenda Information security has become one of the most of the essence(predicate) and ch altogetherenging issues lining todays organizations. With pervasive use of engineering science and widespread connecter to the global environment, organizations increasingly have become exposed to many and wide-ranging terrors. Technical controls butt joint provide material entertainion against galore(postnominal) of these threats, that they alone do non provide a comprehensive solution. As Kevin Mitnick notes in his book, The Art of Deception: dictatorial the Hu man instalment of protective cover, these technological methods of protecting cultivation may be effectual in their respective ways; however, many another(prenominal) losses argon not caused by a privation of technology or faulty technology but alternatively by users of technology and faulty human behavior. It stands to reason wherefore that lot not only can be quit of the problem, but besides they can and should be part of the solution.
wad must be an integral part of any organizations breeding security demur system. Keeping information secure is not only the debt instrument of information technolog y (IT) security professionals, but also the ! business of all people within the organization. Therefore, all users should be aware not only of what their roles and responsibilities are in protecting information resources, but also of how they can protect information and respond to any potential security threat or issue. Security awareness programs address the need to direct all people in an organization so they can help to effectively protect the organizations information assets. But only when how well are organizations doing implementing security...If you want to get a in full essay, raise it on our website: OrderCustomPaper.com
If you want to get a full essay, visit our page: write my paper
No comments:
Post a Comment