Universal Knowledge Solutions S.A.L.- 1 -
Information System Security & Security Policy
Security, Security Policy, Security Incident, Security Audit, Prevention, Detection, Recovery.
Each member of the community must be responsible for the security and protection of electronicinformation resources over which he or she has control.Resources to be protected include networks, computers, software, and data. The physical and logicalintegrity of these resources must be protected against threats such as unauthorized intrusions, maliciousmisuse, or inadvertent compromise. Activities outsourced to off-campus entities must comply with thesame security requirements as in-house activities.However, security policy must be fixed and maintained with the collaboration of managers,administrative officials and users.
Upon completion of this part, the student will be able to understand:
What is information security?
The definition of information security and the factors to consider when maintaining security
Why is security design necessary?
The objective of security design and security requirements should be established.
Definition of security policy and advantages/disadvantages of having a security policy.
General outline of security policy.
Considerations when writing security policy.
What factors should be considered when writing a security policy.