Saturday, 2 March 2019

What Are the Most Important Tools and Technologies for Safeguarding Information Resources?

3. What be the components of an organizational framework for security and control? Firms need to establish a good set of both general and application controls for their information systems. A risk assessment evaluates information assets, identifies control points and control weaknesses, and determines the most cost-efficient set of controls. Firms must also develop a coherent embodied security policy and plans for continuing business operations in the yield of disaster or disruption.The security policy includes polices for acceptable use and identity element management. Comprehensive and systematic MIS auditing helps organizations determine the effectiveness of security and controls for their information systems. 4. What be the most important tools and technologies for safeguarding information resources? Firewalls prevent unauthorized users from accessing a insular network when it is linked to the Internet. Intrusion detection systems monitor private networks from amusing netw ork traffic and attempts to access corporate systems.Passwords, tokens, smart cards, and biometric authentication atomic number 18 used to authenticate systems users. Antivirus softw atomic number 18 checks estimator systems for infections by viruses and worms and often eliminates the spiteful software, while antispyware software combats intrusive and harmful spyware programs. Encryption, the coding and scrambling of messages, is a widely used technology for securing electronic transmissions over unprotected networks.Digital certificates combined with human race key encryption provide further protection of electronic proceedings by authenticating a users identity. Companies can use fault-tolerant computer systems or create high-availability computing environments to make sure that their information systems are always available. Use of software metrics and rigorous software examen help improve software quality and reliability.

No comments:

Post a Comment