Friday, September 18, 2015

Elements of a good security program

Elements of a good security program:
             In General, a good security program will provide the big picture for keeping the data secure. It represents the every part of the company stays involved in the program in a holistic approach. It is not an incident handling guide that happens if a security breach detected. It’s also not a guide to doing periodic charges, though it probably does dictate when to do a safety assessment.
              It defines what type of data is involved and which is not, it also evaluates the risks of company faces, and their plan to decrease them. And it indicates how often the program will be re-evaluated and updated, and when you will assess compliance with the program.
Designated security officer:
        For most security regulations and standards, having a Designated Security Officer (DSO) is not optional — it’s a requirement. Your security officer is the one responsible for coordinating and executing your security program. The officer is your internal check and balance. This person or role should report to someone outside of the IT organization to maintain independence.
Risk assessment:
         This component identifies and assesses the risks that your security program intends to manage. This is perhaps the most important section because it makes you think about the risks your organization faces so that you can then decide on appropriate, cost-effective ways to manage them. Remember that we can only minimize, not eliminate, risk, so this assessment helps us to prioritize them and choose cost-effective countermeasures. The risks that are covered in your assessment might include one or more of the following:

·         Physical loss of data. You may lose immediate access to your data for reasons ranging from floods to loss of electric power. You may also lose access to your data for more subtle reasons: the second disk failure, for example, while your RAID array recovers from the first.
·         Unauthorized access to your own data and client or customer data. Remember, if you have confidential information from clients or customers, you’re often contractually obliged to protect that data as if it were your own.
·         Interception of data in transit. Risks include data transmitted between company sites, or between the company and employees, partners, and contractors at home or other locations.
·         Your data in someone else’s hands. Do you share your data with third parties, including contractors, partners, or your sales channel? What protects your data while it is in their hands?

·         Data corruption. Intentional corruption might modify data so that it favors an external party: think Trojan horses or keystroke loggers on PCs. Unintentional corruption might be due to a software error that overwrites valid data.

Importance of a Security Program in Company

             It's always important to have a good plan for securing the information assets, such program is a security program done by Information Security Professionals.  It also Provides a framework for keeping the company at good security levels by assessing the risks faced and how can we mitigate them or for planning how to keep the program and security up to date.
Your company’s value is its data:
             Think you don’t have anything of value to preserve? Think again. The key asset that a security program helps to defend is your data — and the value of your business is in its data. You already know this if your company is one of many whose data management is included by regulatory and other controls — for example, how you handle customer credit card data. If regulations do not already cover your data management practices, consider the value of the following:


o   Product information, covering designs, plans, grant requests, source code, and drawings
o   Financial data, including market assessments and your company’s financial records.
o   Customer information, including the private information you hold on behalf of clients.


Protecting your data means preserving its confidentiality, integrity, and availability as illuminated by the C-I-A triangle The results of a failure to protect all three of these aspects include business losses, legal liability, and loss of company goodwill.

Tuesday, September 8, 2015

Introduction

Hello Everyone, I am  Studying Masters in Computer Information Systems and Here is My Blog,  I will post about Information Security In Business (News,Methods, Reviews) every week here.