942 resultados para information security management assessment


Relevância:

100.00% 100.00%

Publicador:

Resumo:

This book provides you with all fundamental concepts, guidelines and tools to ensure core business information is identified, protected and used effectively, written in a language that is clear and easy to understand for non-technical ...

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This book provides you with all the fundamental concepts, guidelines and tools to ensure core business information is identified, protected and used effectively, and written in a language that is clear and easy to understand for non ...

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The text addresses the issue of information security as exemplified by clandestine collaboration and the influence exerted by the Internal Security Agency officers upon journalists. The texts analyzes the de lege lata regulations as well as the de lege ferenda ones. As for the former, the penal provisions of the Act, that is Articles 153b–153d (Chapter 10a) are applicable, whereas as for the latter, the applicable regulations are the 2013 Bill Articles numbered 197-199 (Chapter 10). In both the 2002 Act on the Internal Security Agency and Foreign Intelligence Agency as well as in the 2013 draft Bill of the Internal Security Agency, the legislator penalizes the employment by the officers of the information acquired while fulfilling or in connection with official duties for the purpose of affecting the operation of public authority bodies, entrepreneurs or broadcasters, editors-in-chief, journalists and persons conducting publishing activity. Also, the text analyzes regulations concerned with the penalization of clandestine collaboration engaged in by ABW officers with a broadcaster, editor-in-chief, a journalist and a person conducting publishing activity.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Formative assessment was introduced in Rehabilitation Therapy students’ information literacy programs in Fall Term 2006 in the course OT/PT 892: Evidence-Based Practice. It was subsequently employed in the Winter Term 2008 and again in the Spring Term 2008. Formative assessment during student/librarian face-to-face consultations was one of a variety of teaching techniques used in the program. Other techniques included: a required reading; an interactive hands-on searching session; and a summative assessment of the final revised search strategy assignment (these techniques varied somewhat over the 3 classes). With the 2008 entrance class, this course content moved to OT/PT 898: Critical Enquiry, largely in Module 3: Reviewing the Literature. One of the Critical Enquiry’s learning objectives is: “recognize and reflect on the complexity of gathering evidence to inform decision-making.”

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Spending on security in an SME usually has to compete with demands for hardware, infrastructure, and strategic applications. In this paper, the authors seek to explore the reasons why smaller SMEs in particular have consistently failed to see securing information as strategic year-on-year spending, and just regard as part of an overall tight IT budget. The authors scrutinise the typical SMEs reasoning for choosing to see non-spending on security as an acceptable strategic risk. They look particularly at possible reasons why SMEs tend not to take much notice of "scare stories" in the media based on research showing they are increasingly at risk, whilst larger businesses are taking greater precautions and become more difficult to penetrate. The results and their analysis provide useful pointers towards broader business environment changes that would cause SMEs to be more risk-averse and ethical in their approach to securing their own and their clients’ information.