Security Policy

Read Complete Research Material



Security Policy

Security Policy

Introduction

The security policy defines a number of rules, procedures and practices to ensure a level of security consistent with the needs of the organization. Such a document must necessarily be led like a real project involving representatives of users and leads to the highest level of the hierarchy, so that it is accepted by all. When drafting the security policy is complete, the provisions concerning personnel shall be communicated, in order to give security policy maximum impact. Security policy is a formal statement of the rules to be followed by the people receiving access to the technological capital of a company and informative"

Discussion

Most companies are addressing the management of security risks when faced with a security incident relatively Benin. This occurs for example; when an employee's computer is infected with a virus and a responsible corporate improvised computer expert and seeks to eliminate the virus without damaging the computer or the data it contains. Whatever, the initial incident when security problems are increasing to the point of affecting trade performance, most companies get tired of having to deal with such a succession of crises. They then seek an alternative approach to the reactive approach to reduce the probability of occurrence of security incidents. Companies applying risk management moving towards a proactive approach.

Based on recent security incidents, a business can predict and anticipate potential problems. Thus, if a company takes the time to deal with security incidents so rational and weighted to determine the underlying reasons, it will be easier to protect themselves from similar incidents in the future and it will handle these problems more quickly.

Rather than wait until problems arise before answering, the principle of this approach is to minimize the possibility that they occur at the outset. To protect the resources of your business, you must implement controls to reduce the risk of exploitation of vulnerabilities by malicious programs or people or accidental use. The following analogy illustrates this concept. Of course, companies should not completely abandon the reactive approach. Indeed, although effective proactive approach makes it possible to significantly reduce the risk of security incidents, it is unlikely that they disappear completely. There are many methods of classification and risk assessment. However, most of them rely on a quantitative or qualitative risk or a combination of these approaches.

Security policies

For programming security policies Article 3 of Law 9/2009 provides for the establishment of 'regional observatory on integrated security, which support member of the Regional Council in the field of security policies with the task of analyzing the development of the related policies and criminality. This body is made by the President of the Region, following a decision of the Regional Council, on a proposal of the regional authority responsible for safety, as chairman. The Centre must submit to the Regional Government an annual report on activities carried out and the analysis and evaluation projects.

European Data privacy laws are useful for providing data protections and the European enjoys data protection under this ...
Related Ads