Information. for your business processes and information systems as its most critical business assets, and is committed to ensure their confidentiality, integrity and availability for the purpose of ensuring continuity of business, reinforcing trust of its customers and stakeholders, minimizing information security risks, and maximizing returns on investments.
In line with this, we also support and comply with the Information Security Regulation.
Keeping valuable information ‘free from danger’ (i.e., protected and safe from misuse or unauthorized access) is called as Information Security.
We need information security so that people can work more effectively and efficiently, accurate information is accessed or made available when required, information is protected from theft, misuse or use for fraudulent or irregular transactions, deterrent against incidences which may cause reputational damage to the organization and provides proactive protection against attacks on PCs (e.g., viruses, spywares, malwares, phishing, and other malicious activities).
Overview
• Developed to align with the requirements of the Government Information Security Resolution.
• Provides minimum requirement for information security controls.
• Establishes a uniform information security culture to all.
• Drawn from various internationally recognized standards and regulations
• Reflects specific requirements within the context of the Government.
Information
A sequence of symbols that can be interpreted as a message.
Information exists in many forms:
Printed or written
Stored electronically
Transmitted electronically
Visual
e.g. videos, diagrams
Published on the Web
e.g., intranet or internet
Verbal/aural
e.g., conversations, phone calls
Intangible
e.g., knowledge, experience,
expertise, ideas; trade secrets
Information can be;
Created
Owned (as an asset)
Stored
Processed
Transmitted/Communicated
Used (for proper or improper purposes)
Modified or corrupted
Shared or disclosed (whether
appropriately or not)
Destroyed or lost
Stolen
Controlled, secured, and protected
throughout its existence
Why Information is Important!
Compliance with Legal Requirements
– Legal Requirements
• Copyright
• Patents/Royalties
• Trademark
Information Security Infrastructure
– Contractual Security Obligations
• Intranet connections to other BUs
• Remote connections to employees
• Customer networks
• Supply chains
• Third-party access
• SLA, Legal Contracts, Outsourcing Arrangements
Thanks for Read,
Please "SHARE" our post that your friends can read and learn and "COMMENT" us so that we can make our blogbeautiful.
Please Follow us.
Facebook Profile
Twitter
Google+
facebook Page
Youtube
E-mail
Thanks for Read,
Please "SHARE" our post that your friends can read and learn and "COMMENT" us so that we can make our blogbeautiful.
Please Follow us.
Facebook Profile
Google+
facebook Page
Youtube
Thanks
ReplyDelete