This story appe ard on Information Management Journal at hypertext transfer protocol://www.entrepreneur.com/tradejournals/article/print/189486076.html Nov-Dec, 2008 How to create a security measures last in your organization: a late study reveals the impressiveness of assessment, incident response procedures, and social plan testing in improving security alertness programs. by Rotvold, Glenda Information security has become one of the most alpha and ch altogetherenging issues lining todays organizations. With pervasive use of technology and widespread association to the global environment, organizations increasingly have become exposed to many and wide-ranging terrors. Technical controls butt joint provide meaty entertainion against galore(postnominal) of these threats, that they alone do non provide a comprehensive solution. As Kevin Mitnick nones in his book, The Art of Deception: dictatorial the Human division of security measure, these technological m ethods of protecting cultivation may be powerful in their respective ways; however, many another(prenominal) losses be not caused by a privation of technology or faulty technology but alternatively by users of technology and faulty human behavior. It stands to reason wherefore that bulk not only can be quit of the problem, but in any case they can and should be part of the solution.

wad must be an integral part of any organizations discipline security defense reaction system. Keeping information secure is not only the office of information technology (IT) security professionals, but also the responsi bleness of all people within the organizatio! n. Therefore, all users should be aware not only of what their roles and responsibilities are in protecting information resources, but also of how they can protect information and reply to any potential security threat or issue. Security awareness programs address the need to direct all people in an organization so they can help to in effect protect the organizations information assets. But only when how well are organizations doing implementing security...If you want to get a in full essay, nightspot it on our website:
OrderCustomPaper.comIf you want to get a full essay, visit our page:
write my paper
No comments:
Post a Comment