Rabu, 26 Oktober 2011

TUGAS 4 SIM HOTEL

1) PURPOSE OF INFORMATION SECURITY1. SecrecyWays to protect company data and information from the user / orang2 who do not have the authorityFor example: the point is that can see and find out important information and data firms are known only by the owner of an important person or trust company.2. Availability
 
In order for data and information available to pihak2 who has the authority to use it.For example: that is the presence of information it easier for those people who have the authority to act or work easily through the data in the can.3. Integrity
 
The entire system must provide information or provide an accurate picture of the overall systemFor example: all the information available there should be a fundamental examples or guidelines to be used as a picture in a system.2) What the manager if the information is accurate, safe and not relevant are:• Identify Threats: The point is that we as managers preformance this should memperhatika segalam kinds of threats from both internal and external environment• Identify risk: that is some thing or the hazards of the company should pay attention to safety information obtained• Establish Opera-security policy: a policy manager provides is critical to maintaining the security of the information contained within our company.• applying supervision: and as a manager this is the key to security and progress of the company, so the process control for surveillance in order to maintain security is needed.3) Strategies and Stages Majemen stages in Information Security Installing and Maintaining FirewallsKeeping  security system is always up to date Use and update antivirus software Restrict data access rights only concerned Use the ID or a special identifier for the user No wrong in using a password

Tidak ada komentar:

Posting Komentar