Thursday, May 7, 2020
Information Security And Assurance Department - 924 Words
Information Security and Assurance Department Because of identity theft, terrorism, and other criminal activities, President Obama has made information security a national priority. Not only is information security and assurance an American priority, it is also a global issue. Information security and assurance includes of data confidentiality, integrity, and availability along with accountability and confidence all is well with the processes (White, G. L., Hewitt, B., Kruck, S. E. 2013). Our number one and vital priority in this corporation, is security, within our Information Technology department as well as our corporation. By learning from the ongoing information security and assurance issues around the world, we must be vigilant inâ⬠¦show more contentâ⬠¦The same can be said for questions of privacy (Carsten, S. B. 2004). We will set forth ethical parameters for all employees to abide by. We want our employees to understand the parameters and execute them willingly. Every employee should feel comfortable and approac hable in the workplace. No one should fell threaten or inferior of the other. Every employee must be accountable for their actions regardless of what position they put themselves in or the corporation. First and foremost, we can start with honor and integrity within ourselves. Issues Affecting The Information Security And Assurance Department Many violations and unsecured activities has been going on for too long without resolutions. These violations and unsecured activities include leaving websites open for long periods, sending personal identification information (PII) in emails, leaving the work station logged in unattended, and not logging out at the end of the work day. In addition, sending classified information through unclassified channels. By conducting these types of activities can be a hackers dream come true. ââ¬Å"America must also face the rapidly growing threat from cyber-attacks. Now, we know hackers steal people s identities and infiltrate private e-mails. We know foreign countries and companies swipe our corporate secrets. Now our enemies are also seeking the ability to sabotage our power grid, our financial institutions, and our air traffic control
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.