Information security shortly (named called as IS) is a critical part of any small scale company and a big enterprise. To preserve private information is a big challenge for any firm. Information security involves very confidential important assets and other business process.It also includes all those private financial documents and also private information of each and every employers within the organization. In some case information may also include client’s important assets. Without having proper security of all these information, it becomes unreliable. Having lack of proper security mechanism sometimes it is also inaccessible when it is really needed. Lack of security can also invite 3rd parties to let them compromise these private assets and information. Information has two types.
1. Electronic Information
2. Paper form of information
It is must that any organization
must protect this information.
General checklist of IS policy is
as below:
ü
Information must be accessible by
authorized individuals or the group only.
ü
In the corporate world, information
should be managed and processed securely.
ü
Company should demonstrate the best
practice in the information security within the company.
ü
Company should also try to educate
their clients to explain the critical risk of using their software in not a
proper form defined by company only.
ü
Information delivery should be done in
proper and secure way. It should be carried by only trusted environment and
medium only.
ü
Information’s integrity,
confidentiality and avaibility should be maintained properly.
ü
Any personal confidential information
never should be left insecure.
ü
Desktop and other essential hardware
should be locked up when they are not in the use.
ü
Clarity should be taken by each and
every individuals within the organization of responsibility of safe IS practice.
This
is the ideal policy which includes the important line written in ISO 27001, the
international standard on information security. It says that CIA triangle
should be maintained.
References
1. http://foreignpolicyblogs.com/wp-content/uploads/cyberwar.jpg
References
1. http://foreignpolicyblogs.com/wp-content/uploads/cyberwar.jpg
No comments:
Post a Comment