Information Strategies Analyses and Result Implementation in Companies which Use It&C Environment (III)

Author:Assistant Lecturer Delia BÄ‚BEANU, PhD Student

JEL:

DOI:

Keywords:information strategy, security policies, information system audit, business continuity plan, information system security

Abstract:
Choosing the correct information strategy to assure data protection must start from the idea that there is no universal security application. There are no customizing security products to assure the client that nobody will copy or modify the data. We must investigate the main risks sources for information system through a complete security audit, starting from physical access, internet connection, personnel, network resources, unauthorized applications, etc. Clients will know the risks which the company values are exposed to in case of no implementing measures and efficacy security applications to reduce risks.\r\nImplementing the right information system technologies regarding functionality and costs (access control systems, antivirus applications, firewall, etc.) and adopting some security policies and procedures (knowing by employees) are the main attributes which start the security applications implementing. \r\n\r\n