Introduction
COURSE OVERVIEW
Information has become the most valuable asset of any organization. And keeping that information secure is a major factor in the design and development of any computer system. Security is defined by Merriam-Webster as “the state of being protected or safe from harm”. It is up to every organization to insure that their data is protected, and that nothing that is harmful to the company or its clients is compromised.
This course covers much material about information security in a few short weeks. Whereas the subject is much deeper than what is covered in the course material, you should obtain a useful overview of how important effective information security is, and some ways it can be effectively …show more content…
In addition, organizations constantly face legal, ethical, and regulatory requirements from governments, business partners, and others they work with. These will add additional factors when weighing the costs and benefits of different solutions to information security risks. In fact, these requirements may even make some risks more important, often because a company will not want to get in trouble with a government even though they might normally live with the risk they are being forced to resolve through regulations. Understanding the various laws that will affect data is of prime importance to any security …show more content…
A popular saying is, “inspect what you expect,” and this is definitely true in the area of IT information security auditing. The goal should not be to catch rule breakers, but rather to work with IT and the business to ensure nothing slips through the cracks and that solid practices are always followed. Doing this will go a long way to ensuring and maintaining the expected information security policy of the