This story appe ared on Information Management Journal at hypertext transfer protocol://www.entrepreneur.com/tradejournals/article/print/189486076.html Nov-Dec, 2008 How to create a security measures last in your organization: a new study reveals the impressiveness of assessment, incident response procedures, and social engineering testing in improving security consciousness programs. by Rotvold, Glenda Information security has become one of the most great and ch altogetherenging issues lining todays organizations. With pervasive use of applied science and widespread inter-group communication to the global environment, organizations increasingly have become exposed to many and wide-ranging terrors. Technical controls butt joint provide substantial entertainion against galore(postnominal) of these threats, that they alone do non provide a comprehensive solution. As Kevin Mitnick nones in his book, The Art of Deception: dictatorial the Human fraction of bail , these technological methods of protecting cultivation may be telling in their respective ways; however, many another(prenominal) losses are not caused by a privation of technology or faulty technology but alternatively by users of technology and faulty human behavior. It stands to reason wherefore that battalion not only can be quit of the problem, but as well they can and should be part of the solution.
wad must be an integral part of any organizations discipline security apology system. Keeping information secure is not only the province of information technology (IT) security professionals, but also the ri ghteousness of all people within the organiz! ation. Therefore, all users should be aware not only of what their roles and responsibilities are in protecting information resources, but also of how they can protect information and do to any potential security threat or issue. Security awareness programs address the need to direct all people in an organization so they can help to in effect protect the organizations information assets. But only when how well are organizations doing implementing security...If you want to get a in full essay, influence it on our website: OrderCustomPaper.com
If you want to get a full essay, visit our page: write my paper
No comments:
Post a Comment