Information Security

Discussion Topic On Information Security And Risk Management Only

Oracle VM VirtualBox open-source, cross-platform, virtualization software, enables developers to deliver code faster by running multiple operating systems on a single device. IT teams and solution providers use VirtualBox to reduce operational costs and shorten the time needed to securely deploy applications,monitors and analyze user activities and information across your network, such as permissions and …

Discussion Topic On Information Security And Risk Management Only Read More »

Information Security Fundamentals, Security Policies, And Operations Life Cycle

This week we learned about Information Security Fundamentals, Security Policies, and Operations Life Cycle. Based on the week’s objectives of defining network security and business priorities that must be taken into account provide your own experiences and perceptions of Network Security and Business Priorities. Research these topic areas on the internet to support your information …

Information Security Fundamentals, Security Policies, And Operations Life Cycle Read More »

Research Paper: Information Security Policy

Information security uses administrative, technical (logical), and physical controls to mitigate risks related to organization’s assets.  A policy is an administrative control. If no policy exist in the IT department, research shows that employees will default to a defacto policy.  A defacto policy means a policy that is in effect ,but not formally recognize.  To stop this for happening, …

Research Paper: Information Security Policy Read More »