Security polices embedded in the information technology…..

The confidentiality,integrity,availability of the data is very important for the good governance  Failure to adequately secure information increases the risk of financial and reputational losses.   This information security policy outline approach to information security management. It provides the guiding principles and responsibilities necessary to safeguard the security of the information systems. Supporting policies, codes of practice, procedures and guidelines provide further details. The main idea is basically to Provide the…

How to Identify Security Breaches Quickly?

Network administrator and cabling teams are the key persons spotting the security breaches in an organization. Two technologies currently used in network monitoring systems: SPAN (switched port analyzer), also known as port mirroring, and TAP (traffic access point). A SPAN port copies traffic from any traffic port to a single unused port. SPAN ports also prohibit bi-directional traffic on that port to protect against back flow of traffic into the…

The Importance Of Organization Information Security………

To implement an security control inside the organization is very important for the organization to survive and to have some competitive advantage. By having the segregation of duties is very important apart from that who is doing what and the roles and responsibilities of the persons i the organizations is very important so that to classify like what is the role of information security officer in the organization. In compliance with…

Access Control- Limiting access to a system

A.9. Access Control   To begin with “ if  you have no access control means you have no security at all.” Access control is one of the main building blocks of information security. It is to be designed as it is both secure enough and acceptable to users. The purpose of this document is to specify the rules for access to various systems, sensitive information and equipment facilities. Using an…

Keep Calm and have a Business Continuity Management in Place.

Information Security aspects of Business Continuity Management Business continuity is a proactive plan to avoid and mitigate risks which might create a disruption in the delivery of service to your customers or abrupt your operations. Business continuity management outlines the steps should be taken before, during and after an event to maintain the financial viability of an organization. Business continuity management elaborates a framework for identifying organization’s risk of exposure…