SlideShare a Scribd company logo
1 of 2
Describe and explain several I.T. safeguards for an organization to adopt, in their order of
importance and tell why each is in that position.
Solution
The safeguards that should be adopted by organizations are:
a.) Identifying and prioritizing the confidential iformation: This is done to make tha data or the
classified information secure.Social security numbers,account numbers,identification cards and
etc must be protected .And the organizations need to protect their details such as their
contracts,financial releases and etc.
b.) Determining aaccess and usage policies: After making risk assessment ,the companies can
then decide on the types of distribution policies they can make.Some of them are customer
information,employee records and etc.
c.) Monitoring regularly: This is important to protect the information assets.This is used to
monitor how much information is being used daily and verifying th ecompliance and distribution
poicies and taking actions if they are violated.
d.) Reviewing the progress of an organization: This has to be done very frequently in every
department to achieve maximum effectiveness.Through this,omprovements or changes can be
made wherever necessary.
e.) Performing risk assessment: This is crucial to understand how the most confidential
information flows through an organization and who all have access to these and whether this
confidential information is being manipulated.
Describe and explain several I-T- safeguards for an organization to ad (1).docx

More Related Content

Similar to Describe and explain several I-T- safeguards for an organization to ad (1).docx

(CDC IT Security Staff BCP Policy) ([CSIA 413,).docx
 (CDC IT Security Staff BCP Policy) ([CSIA 413,).docx (CDC IT Security Staff BCP Policy) ([CSIA 413,).docx
(CDC IT Security Staff BCP Policy) ([CSIA 413,).docx
joyjonna282
 
Using Modelling and Simulation for Policy Decision Support in Identity Manage...
Using Modelling and Simulation for Policy Decision Support in Identity Manage...Using Modelling and Simulation for Policy Decision Support in Identity Manage...
Using Modelling and Simulation for Policy Decision Support in Identity Manage...
gueste4e93e3
 
Topic Describe each of the elements of a Business Continuity Plan .docx
Topic Describe each of the elements of a Business Continuity Plan .docxTopic Describe each of the elements of a Business Continuity Plan .docx
Topic Describe each of the elements of a Business Continuity Plan .docx
juliennehar
 
There are two general types of data dictionaries a database manag
There are two general types of data dictionaries a database managThere are two general types of data dictionaries a database manag
There are two general types of data dictionaries a database manag
GrazynaBroyles24
 
Chapter 1The International Information Systems Security Certifi.docx
Chapter 1The International Information Systems Security Certifi.docxChapter 1The International Information Systems Security Certifi.docx
Chapter 1The International Information Systems Security Certifi.docx
cravennichole326
 
Information Assurance Guidelines For Commercial Buildings...
Information Assurance Guidelines For Commercial Buildings...Information Assurance Guidelines For Commercial Buildings...
Information Assurance Guidelines For Commercial Buildings...
Laura Benitez
 
Legal and Ethical Implications of Cybersecurity.pptx
Legal and Ethical Implications of Cybersecurity.pptxLegal and Ethical Implications of Cybersecurity.pptx
Legal and Ethical Implications of Cybersecurity.pptx
soulscout02
 

Similar to Describe and explain several I-T- safeguards for an organization to ad (1).docx (20)

Module 3_Lesson 7.pptx
Module 3_Lesson 7.pptxModule 3_Lesson 7.pptx
Module 3_Lesson 7.pptx
 
(CDC IT Security Staff BCP Policy) ([CSIA 413,).docx
 (CDC IT Security Staff BCP Policy) ([CSIA 413,).docx (CDC IT Security Staff BCP Policy) ([CSIA 413,).docx
(CDC IT Security Staff BCP Policy) ([CSIA 413,).docx
 
Qatar Proposal
Qatar ProposalQatar Proposal
Qatar Proposal
 
2 Day MOSTI Workshop
2 Day MOSTI Workshop2 Day MOSTI Workshop
2 Day MOSTI Workshop
 
Using Modelling and Simulation for Policy Decision Support in Identity Manage...
Using Modelling and Simulation for Policy Decision Support in Identity Manage...Using Modelling and Simulation for Policy Decision Support in Identity Manage...
Using Modelling and Simulation for Policy Decision Support in Identity Manage...
 
Topic Describe each of the elements of a Business Continuity Plan .docx
Topic Describe each of the elements of a Business Continuity Plan .docxTopic Describe each of the elements of a Business Continuity Plan .docx
Topic Describe each of the elements of a Business Continuity Plan .docx
 
EIS Amendments CA INTER
EIS Amendments CA INTEREIS Amendments CA INTER
EIS Amendments CA INTER
 
What Are The Six Pillars Of Cybersecurity.pdf
What Are The Six Pillars Of Cybersecurity.pdfWhat Are The Six Pillars Of Cybersecurity.pdf
What Are The Six Pillars Of Cybersecurity.pdf
 
There are two general types of data dictionaries a database manag
There are two general types of data dictionaries a database managThere are two general types of data dictionaries a database manag
There are two general types of data dictionaries a database manag
 
Development of MIS: Information requirement, Designing of MIS, Implementation...
Development of MIS: Information requirement, Designing of MIS, Implementation...Development of MIS: Information requirement, Designing of MIS, Implementation...
Development of MIS: Information requirement, Designing of MIS, Implementation...
 
Kmicro Cybersecurity Offerings 2020
Kmicro Cybersecurity Offerings 2020Kmicro Cybersecurity Offerings 2020
Kmicro Cybersecurity Offerings 2020
 
Chapter 1The International Information Systems Security Certifi.docx
Chapter 1The International Information Systems Security Certifi.docxChapter 1The International Information Systems Security Certifi.docx
Chapter 1The International Information Systems Security Certifi.docx
 
Information Assurance Guidelines For Commercial Buildings...
Information Assurance Guidelines For Commercial Buildings...Information Assurance Guidelines For Commercial Buildings...
Information Assurance Guidelines For Commercial Buildings...
 
This ppt contains from chapter 6-10 and 13 of Maintenance and installation.
This ppt contains from chapter 6-10 and 13 of Maintenance and installation.This ppt contains from chapter 6-10 and 13 of Maintenance and installation.
This ppt contains from chapter 6-10 and 13 of Maintenance and installation.
 
Internet security and privacy issues
Internet security and privacy issuesInternet security and privacy issues
Internet security and privacy issues
 
Importance of Information Security and Goals for Preventing Data Breaches
 Importance of Information Security and Goals for Preventing Data Breaches Importance of Information Security and Goals for Preventing Data Breaches
Importance of Information Security and Goals for Preventing Data Breaches
 
FixNix 17 products1.0
FixNix 17 products1.0FixNix 17 products1.0
FixNix 17 products1.0
 
Privacy and Data Security | Data Collection | Social Media
Privacy and Data Security | Data Collection | Social MediaPrivacy and Data Security | Data Collection | Social Media
Privacy and Data Security | Data Collection | Social Media
 
Healthcare info tech systems cyber threats ABI conference 2016
Healthcare info tech systems cyber threats ABI conference 2016Healthcare info tech systems cyber threats ABI conference 2016
Healthcare info tech systems cyber threats ABI conference 2016
 
Legal and Ethical Implications of Cybersecurity.pptx
Legal and Ethical Implications of Cybersecurity.pptxLegal and Ethical Implications of Cybersecurity.pptx
Legal and Ethical Implications of Cybersecurity.pptx
 

More from cliftonl1

How is communication a part of best practices-Solution4 Leadership Bes.docx
How is communication a part of best practices-Solution4 Leadership Bes.docxHow is communication a part of best practices-Solution4 Leadership Bes.docx
How is communication a part of best practices-Solution4 Leadership Bes.docx
cliftonl1
 
How does the National Society of Professional Engineers Code of Ethics.docx
How does the National Society of Professional Engineers Code of Ethics.docxHow does the National Society of Professional Engineers Code of Ethics.docx
How does the National Society of Professional Engineers Code of Ethics.docx
cliftonl1
 
How do I determine the Rf Value with just the information I have provi.docx
How do I determine the Rf Value with just the information I have provi.docxHow do I determine the Rf Value with just the information I have provi.docx
How do I determine the Rf Value with just the information I have provi.docx
cliftonl1
 
How do I print a list of payroll checks for the calendar year to date.docx
How do I print a list of payroll checks for the calendar year to date.docxHow do I print a list of payroll checks for the calendar year to date.docx
How do I print a list of payroll checks for the calendar year to date.docx
cliftonl1
 
How does SO2 in the atmosphere affect global warming- In general- what.docx
How does SO2 in the atmosphere affect global warming- In general- what.docxHow does SO2 in the atmosphere affect global warming- In general- what.docx
How does SO2 in the atmosphere affect global warming- In general- what.docx
cliftonl1
 
how do the different architectures of a polymer affect their propertie.docx
how do the different architectures of a polymer affect their propertie.docxhow do the different architectures of a polymer affect their propertie.docx
how do the different architectures of a polymer affect their propertie.docx
cliftonl1
 
how would a police department exhibit different structure and procedur.docx
how would a police department exhibit different structure and procedur.docxhow would a police department exhibit different structure and procedur.docx
how would a police department exhibit different structure and procedur.docx
cliftonl1
 

More from cliftonl1 (20)

How many dance steps would the square have-and-Construct a multiplicat.docx
How many dance steps would the square have-and-Construct a multiplicat.docxHow many dance steps would the square have-and-Construct a multiplicat.docx
How many dance steps would the square have-and-Construct a multiplicat.docx
 
How has the physician-patient relationship changed over the past centu.docx
How has the physician-patient relationship changed over the past centu.docxHow has the physician-patient relationship changed over the past centu.docx
How has the physician-patient relationship changed over the past centu.docx
 
How is treasury stock shown on the balance sheet- Treasury stock is no.docx
How is treasury stock shown on the balance sheet- Treasury stock is no.docxHow is treasury stock shown on the balance sheet- Treasury stock is no.docx
How is treasury stock shown on the balance sheet- Treasury stock is no.docx
 
How is repetition of components different from redundancy- How are the.docx
How is repetition of components different from redundancy- How are the.docxHow is repetition of components different from redundancy- How are the.docx
How is repetition of components different from redundancy- How are the.docx
 
How is communication a part of best practices-Solution4 Leadership Bes.docx
How is communication a part of best practices-Solution4 Leadership Bes.docxHow is communication a part of best practices-Solution4 Leadership Bes.docx
How is communication a part of best practices-Solution4 Leadership Bes.docx
 
How does the National Society of Professional Engineers Code of Ethics.docx
How does the National Society of Professional Engineers Code of Ethics.docxHow does the National Society of Professional Engineers Code of Ethics.docx
How does the National Society of Professional Engineers Code of Ethics.docx
 
how does cinchona catalyst workSolutionCatalyst working- 1) Catalyst i.docx
how does cinchona catalyst workSolutionCatalyst working- 1) Catalyst i.docxhow does cinchona catalyst workSolutionCatalyst working- 1) Catalyst i.docx
how does cinchona catalyst workSolutionCatalyst working- 1) Catalyst i.docx
 
How does the evolution of attack tools affect existing systems- What s.docx
How does the evolution of attack tools affect existing systems- What s.docxHow does the evolution of attack tools affect existing systems- What s.docx
How does the evolution of attack tools affect existing systems- What s.docx
 
How do you think the DATA Act will impact governmental entities and st.docx
How do you think the DATA Act will impact governmental entities and st.docxHow do you think the DATA Act will impact governmental entities and st.docx
How do you think the DATA Act will impact governmental entities and st.docx
 
How do I determine the Rf Value with just the information I have provi.docx
How do I determine the Rf Value with just the information I have provi.docxHow do I determine the Rf Value with just the information I have provi.docx
How do I determine the Rf Value with just the information I have provi.docx
 
How do I print a list of payroll checks for the calendar year to date.docx
How do I print a list of payroll checks for the calendar year to date.docxHow do I print a list of payroll checks for the calendar year to date.docx
How do I print a list of payroll checks for the calendar year to date.docx
 
How does SO2 in the atmosphere affect global warming- In general- what.docx
How does SO2 in the atmosphere affect global warming- In general- what.docxHow does SO2 in the atmosphere affect global warming- In general- what.docx
How does SO2 in the atmosphere affect global warming- In general- what.docx
 
How does an awareness of the historical link between the United States.docx
How does an awareness of the historical link between the United States.docxHow does an awareness of the historical link between the United States.docx
How does an awareness of the historical link between the United States.docx
 
How do you utilize PM software to manage team activities-SolutionProje.docx
How do you utilize PM software to manage team activities-SolutionProje.docxHow do you utilize PM software to manage team activities-SolutionProje.docx
How do you utilize PM software to manage team activities-SolutionProje.docx
 
how do the different architectures of a polymer affect their propertie.docx
how do the different architectures of a polymer affect their propertie.docxhow do the different architectures of a polymer affect their propertie.docx
how do the different architectures of a polymer affect their propertie.docx
 
How do phospholipid bilayers maintain specific concentrations of solut.docx
How do phospholipid bilayers maintain specific concentrations of solut.docxHow do phospholipid bilayers maintain specific concentrations of solut.docx
How do phospholipid bilayers maintain specific concentrations of solut.docx
 
how would a police department exhibit different structure and procedur.docx
how would a police department exhibit different structure and procedur.docxhow would a police department exhibit different structure and procedur.docx
how would a police department exhibit different structure and procedur.docx
 
How will you close your knowledge gap- Is your mind geared to re-think.docx
How will you close your knowledge gap- Is your mind geared to re-think.docxHow will you close your knowledge gap- Is your mind geared to re-think.docx
How will you close your knowledge gap- Is your mind geared to re-think.docx
 
How to do web application testing on a website checking it-'s (Functio.docx
How to do web application testing on a website checking it-'s (Functio.docxHow to do web application testing on a website checking it-'s (Functio.docx
How to do web application testing on a website checking it-'s (Functio.docx
 
How to make a Mic 1 L2 instruction set that takes in user input throug.docx
How to make a Mic 1 L2 instruction set that takes in user input throug.docxHow to make a Mic 1 L2 instruction set that takes in user input throug.docx
How to make a Mic 1 L2 instruction set that takes in user input throug.docx
 

Recently uploaded

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Recently uploaded (20)

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 

Describe and explain several I-T- safeguards for an organization to ad (1).docx

  • 1. Describe and explain several I.T. safeguards for an organization to adopt, in their order of importance and tell why each is in that position. Solution The safeguards that should be adopted by organizations are: a.) Identifying and prioritizing the confidential iformation: This is done to make tha data or the classified information secure.Social security numbers,account numbers,identification cards and etc must be protected .And the organizations need to protect their details such as their contracts,financial releases and etc. b.) Determining aaccess and usage policies: After making risk assessment ,the companies can then decide on the types of distribution policies they can make.Some of them are customer information,employee records and etc. c.) Monitoring regularly: This is important to protect the information assets.This is used to monitor how much information is being used daily and verifying th ecompliance and distribution poicies and taking actions if they are violated. d.) Reviewing the progress of an organization: This has to be done very frequently in every department to achieve maximum effectiveness.Through this,omprovements or changes can be made wherever necessary. e.) Performing risk assessment: This is crucial to understand how the most confidential information flows through an organization and who all have access to these and whether this confidential information is being manipulated.