Essay from the year 2017 in the subject Business economics - Company formation, Business Plans, grade: 1.0, Kenyatta University, language: English, abstract: Significantly, the manifold areas of any institution's security program have for years been observed to play a vital part in aiding the certification and accreditation process of the information assets of that particular company. In this respect, any organization's information security program is adequately made up by these supporting areas in alignment with both C&A and the post C&A activities. Sensibly, it remains mandatory for an individual to have a plan so as to make sure that his/her information assets' security, regardless of the size of the organization ; an aspect termed as a security information program. The process involved in creating a security program makes an individual think holistically concerning his/her company's security, regardless of the length of the plan. Typically, a security program offers the structure to keep an individual's business at a desired security level; a phenomenon that occurs through risks assessment faced, presenting sound decisions on how to mitigate these risks along with planning the manner through which one keeps the program and the security practices up-to-date. Substantially, data is the predominant value of any organization; the company's data is the key asset that any security program will aid in protection not to mention that the business' value rests in its data, an aspect clearly evident in organizations whose information management is controlled by governmental and other regulations, for instance, managing credit card information of the customers. On the other hand, in cases where data management practices are yet to be covered by regulations, the values of the following have to be considered: product information, financial data and customer information. Data protection refers to protecting the information's confidentiality, integrity as well as its availability, thus; failure of protecting these three aspects results in business loss, loss of the organization's goodwill and even legal liability.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.