13. Concepts and security models

Enterprise security architecture represents a holistic approach to incorporate building blocks of security across the enterprise. Common security services are a number of security functions suitable as foundations for common security services in the enterprise. Examples are access control, boundary control, integrity, cryptographic, and audit monitoring services. In a security architecture we start with creationContinue reading “13. Concepts and security models”

9. Data Management

The Information owner is ultimately responsible for data management and safeguarding of assigned information assets. They demonstrate a strong commitment to an organization’s information security security program. To manage data an information owner will develop an information security policy and lead by example. Responsibilities include: Reviewing the classification levels of assigned assets. Determining information classification.Continue reading “9. Data Management”

Design a site like this with WordPress.com
Get started