INFORMATION SYSTEM SECURITY & ASSURANCE BY @jerryivan|| 30%payout to @steemingcommunity.

in hive-139293 •  3 years ago 

images (13).jpeg
source

Hello good morning to all the members of this community, I hope you are having a nice time.
Today I will be sharing with you on Information system security.

Information system security is defined as the process by which we keep our information safe and secured to avoid intruders from assessing it. Any computing environment in any organization is made up of component which enables the company to sustain competitive advantages over its competitors.

Information security is achieved by implementing managerial operation and technical that deliver information confidentiality, information integrity and information availability.

  1. INFORMATION CONFIDENTIALITY:-
    This is the protection of information from unauthorized access or disclosure

  2. INFORMATION INTEGRITY:-
    This is the protection of information from unauthorized modification.

  3. INFORMATION AVAILABILITY:-
    This is realized when a user who need to know, obtains the required information from the appropriate resource.

PERSONAL SECURITY.

This is simply referring to those practices and tools that are accepted and adopted by human resources unit to ensure that personnel security safeguard are applied. Personnel security safeguard may be organized into categories

  1. QUALIFICATION ASSURANCE:-
    This is the process of making sure that the employees hired matches both the specifications of the job and the security clearance of the job.

  2. SCREENING ASSURANCE:-
    Screening and background check of individuals must be conducted thoroughly to make sure that the candidate with history of poor behaviour cannot infilterate into the system.

  3. AUTHORIZING OF PROCESS:-
    This consist of granting or taking away physical or system assess privilege at the time of hiring or at the termination of his or her duties. All privileges of an employee system access maybe granted or revoked following a format or auditable process.

  4. SECURITY TRAINING:-
    Securing training program are made available for employees accordance with the security requirement of their position.

  5. NON-DISCLOSURE AGREEMENT:-
    All the employees involved in information security must sign an agreement appropriate to their position. A non-disclosure agreement have to be signed by all individual who needs assess to sensitive or confidential information prior to granting assess to that information.

Thank you for reading.

To the attention of @steemingcuration.

Authors get paid when people like you upvote their post.
If you enjoyed what you read here, create your account today and start earning FREE STEEM!
Sort Order:  

!zen 30

the post has been upvoted successfully! Remaining bandwidth: 160%

  ·  3 years ago (edited)

Thank you for this helpful information