Tuesday, August 27, 2019
It security Case Study Example | Topics and Well Written Essays - 750 words
It security - Case Study Example It largely depends on IT infrastructural resources and assets for the completion of its transactions and operations. The average users of the system include the IT administrators and the staff, most of which posses above average computer literacy. The staff basically requires a computer running on a UNIX platform networked to the companyââ¬â¢s server especially those located at the satellite offices across the country. Security policy is the most crucial element of a companyââ¬â¢s security program given that it entails all the rules and procedures that must be adhered in order to ensure information security; the integrity, confidentiality and availability of data 1. It is the policy of DechTech Solutions that information, in all forms, is protected from unauthorized modification, destruction or disclosure in order to ensure the integrity, confidentiality and availability of data to all the employees and the and other users. The Chief Information Officer (CIO) alongside the Information Security Officer (ISO) has the primary responsibility for the policy implementation and assuring compliance. They work closely with owners, user management and custodians in development and implementation of the security policies of DechTech Solutions. Their responsibilities include; the provision of basic support for users and systems, ensuring that DechTech Solutions security procedures, policies and standards are in place and are adhered to, the provision of advice to owners in the identification and classification of computer resources, performing security audits, advising system development owners in the implementation of security controls, providing employee security education and providing regular reports DechTech oversight committee on information security. Information owner, the manager responsible for the creation of information and is usually the primary user1, is responsible for authorizing access and assigning
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment