
Design of IT security policies
Directorate of Information and Communication Technologies DTIC of the University of Cuenca
Versandkostenfrei!
Versandfertig in 6-10 Tagen
47,99 €
inkl. MwSt.
PAYBACK Punkte
24 °P sammeln!
Computer systems, computer equipment, information generated by organisations, companies, educational establishments, etc., are of great importance and must be properly controlled and protected. An alternative is the implementation of computer security policies to guarantee business continuity. With the increase of the technological infrastructure of the University of Cuenca, the number of users, departmental divisions and communication equipment is increasing, which generates the need to implement new security mechanisms to maintain the integrity, availability and confidentiality of the inform...
Computer systems, computer equipment, information generated by organisations, companies, educational establishments, etc., are of great importance and must be properly controlled and protected. An alternative is the implementation of computer security policies to guarantee business continuity. With the increase of the technological infrastructure of the University of Cuenca, the number of users, departmental divisions and communication equipment is increasing, which generates the need to implement new security mechanisms to maintain the integrity, availability and confidentiality of the information. The proper functioning of computer equipment, computer systems and communication equipment must be linked to a correct selection of controls that allow the institutional interests to be achieved.