Process of information security, Other Subject

Assignment Help:

Process

The terms reasonable and prudent person, due diligence and due care have been used in the fields of Securities, Finance, and Law for a lot of years. In recent years these terms have found their method into the fields of computing and information safety. U.S.A. Federal Sentencing strategy now make it possible to hold corporate officers liable for failing to work out due care and due diligence in the organization of their information systems. In the business world, customers, business partners, stockholders and governments have the expectation that corporate officers will run the business in agreement with accepted business put into practice and in compliance with laws and other narrow necessities. This is often described as the "reasonable and prudent person" rule. A cautious person takes due concern to ensure that everything required is done to operate the business by noise business principles and in a legal ethical manner. A cautious person is also hard-working (mindful, attentive, and ongoing) in their due care of the business.

In the field of Information Safety, Harris presents the following definitions of due care and due diligence.

"Due care are steps that are taken to demonstrate that a corporation has taken responsibility for the behavior that take place within the corporation and has taken the essential steps to help protect the corporation, its resources, and employees." And, [Due diligence are the] "continual behavior that make certain the security mechanisms are repeatedly maintained and operational."

Notice should be made to two significant points in these definitions. First, in due care, steps are in use to show - this means that the steps can be established, measured, or even produce touchable artifacts. Second, in due industry, there are continual activities - this assets that people are actually doing things to observe and protect the guard mechanisms, and these behavior are continuing.


Related Discussions:- Process of information security

Explain grading techniques along with its advantages, Question 1 Explain g...

Question 1 Explain grading techniques along with its advantages and disadvantages Question 2 What is Block movement method? Explain the process of block movement method

Humanities, (TCOs 3 & 4) How have changes in technology affected the record...

(TCOs 3 & 4) How have changes in technology affected the recording industry and our understanding of what it means to be a professional musician? How have changes in technology aff

Goverment, Forming a strong political _________________________ without for...

Forming a strong political _________________________ without forming an equally sound understanding of politics could lead to making unwise choices in the voting booth.

Security model, SECURIT Y MODEL A computer security model is a system ...

SECURIT Y MODEL A computer security model is a system for identifying and enforcing security policies. A security model may be established upon a formal model of access rights

Electronic data interchange, ELECTRONIC DATA INTERCHANGE Electronic Dat...

ELECTRONIC DATA INTERCHANGE Electronic Data Interchange (EDI) refers to the planned transmission of data between organizations by electronic funds. It is used to transmit elect

Simple b2b connectivity using punchout, Simple B2B Connectivity Using Punch...

Simple B2B Connectivity Using Punchout Now, let's focus on two of the B2B connectivity problems previously mentioned, and illustrated in Figure 1.5. First, let's discuss the su

Rules for making good design, Question 1: (a) List any ten rules for ma...

Question 1: (a) List any ten rules for making good design. (b) Elaborate on any five of those. Give visual examples as appropriate to illustrate each rule and use written

#title.utility, what is the relationship between utility, justice, rights, ...

what is the relationship between utility, justice, rights, and caring?

Explain the significance of public administration, Question 1 Public admi...

Question 1 Public administration is an integral part of the social, cultural and economic life of a nation. In view of this statement explain the significance of Public administr

Punch-out from wcbe and wcs mpe to external suppliers, Punch-out from WCBE ...

Punch-out from WCBE and WCS MPE to External Suppliers A conventional electronic marketplace (EMP) or a private trading exchange (PTX), such as IBM WCS MPE, provides a variety o

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd