Friday, December 1, 2017

Keep your Information safe in your Computer & Mobile, Lesson 1 of 25

Information. for your business processes and information systems as its most critical business assets, and is committed to ensure their confidentiality, integrity and availability for the purpose of ensuring continuity of business, reinforcing trust of its customers and stakeholders, minimizing information security risks, and maximizing returns on investments.
In line with this, we also support and comply with the Information Security Regulation.
Keeping valuable information ‘free from danger’ (i.e., protected and safe from misuse or unauthorized access) is called as Information Security.
We need information security so that people can work more effectively and efficiently, accurate information is accessed or made available when required, information is protected from theft, misuse or use for fraudulent or irregular transactions, deterrent against incidences which may cause reputational damage to the organization and provides proactive protection against attacks on PCs (e.g., viruses, spywares, malwares, phishing, and other malicious activities).

Overview
• Developed to align with the requirements of the Government Information Security Resolution.
• Provides minimum requirement for information security controls.
• Establishes a uniform information security culture to all.
• Drawn from various internationally recognized standards and regulations 
• Reflects specific requirements within the context of the Government.

Information

A sequence of symbols that can be interpreted as a message.

Information exists in many forms:
 Printed or written
 Stored electronically
 Transmitted electronically
 Visual 
e.g. videos, diagrams
 Published on the Web 
e.g., intranet or internet
 Verbal/aural 
e.g., conversations, phone calls
 Intangible 
e.g., knowledge, experience, 
expertise, ideas; trade secrets

Information can be;
 Created
 Owned (as an asset)
 Stored
 Processed
 Transmitted/Communicated
 Used (for proper or improper purposes)
 Modified or corrupted
 Shared or disclosed (whether 
appropriately or not)
 Destroyed or lost
 Stolen
 Controlled, secured, and protected 
throughout its existence

Why Information is Important!

Compliance with Legal Requirements
– Legal Requirements
• Copyright
• Patents/Royalties
• Trademark

Information Security Infrastructure
– Contractual Security Obligations
• Intranet connections to other BUs
• Remote connections to employees
• Customer networks
• Supply chains
• Third-party access
• SLA, Legal Contracts, Outsourcing Arrangements


Thanks for Read,
Please "SHARE" our post that your friends can read and learn and "COMMENT" us so that we can make our blogbeautiful.

Please Follow us.
Facebook Profile
Twitter
Google+
facebook Page
Youtube
E-mail

1 comment:

Learn how hackers are stealing passwords to protect your own

Fixing the Leak: See How Hackers Are Stealing Your Passwords There is no way you are going to win a battle you are not prepared for. By pr...