The Security Policy Processing Method Design Based on Data life cycle

Loading...
Thumbnail Image

Downloads

6

Date issued

Authors

Abobaker, Musbah

Journal Title

Journal ISSN

Volume Title

Publisher

Vysoká škola báňská - Technická univerzita Ostrava

Location

ÚK/Sklad diplomových prací

Signature

201200284

Abstract

The aim of this work is to focus on Security Management from the Data Life Cycle Perspective and provide a model that can be easy understand and to implement for any organizations type. Information life cycle management enables us to understand our data, which is an extremely valuable business asset and which must be managed properly, to ensure business success and regulatory compliance. Understanding data management means classify and determine rules, responsibility and IT requested and determine the security policy’s requirement. The work divided for two parts the theoretical part and the practical part. The theoretical part include (the description of some theories and methods related to information security, description areas effects on information security and the description of the relation between data life cycle and the information security, and description of the model based on data life cycle and its processes) The practical part is the implementation where the model will be in real action with one organization named Libya insurance company.

Description

Import 02/12/2011

Subject(s)

business scenario, threats, audit, plan, security policy, authentication, authorization, access control

Citation