Fundamentals of Information Systems Security/Information Security and Risk Management: Difference between revisions

Jump to navigation Jump to search
[checked revision][checked revision]
Content deleted Content added
Undid revision 3509104 by Eihel (discuss) what's exactly wrong to add an acronym ?
Tag: Undo
m →‎Security Program: better (don't see the slash)
Line 6: Line 6:
''Information Security management'' is a process of defining the security controls in order to protect the information assets.
''Information Security management'' is a process of defining the security controls in order to protect the information assets.
===Security Program===
===Security Program===
The first action of a management program to implement information security/iss is to have a security program in place. Though some argue the first act would be to gain some real "proof of concept" "explainable thru display on the monitor screen" security knowledge. Start with maybe understanding where OS passwords are stored within the code inside a file within a directory. If you don't understand Operating Systems at the root directory level maybe you should seek out advice from somebody who does before even beginning to implement security program management and objectives.
The first action of a management program to implement information security (iss) is to have a security program in place. Though some argue the first act would be to gain some real "proof of concept" "explainable thru display on the monitor screen" security knowledge. Start with maybe understanding where OS passwords are stored within the code inside a file within a directory. If you don't understand Operating Systems at the root directory level maybe you should seek out advice from somebody who does before even beginning to implement security program management and objectives.


'''Security Program Objectives'''
'''Security Program Objectives'''