The Security Policy Processing Method Design Based on Data life cycle
Loading...
Downloads
6
Date issued
Authors
Abobaker, Musbah
Journal Title
Journal ISSN
Volume Title
Publisher
Vysoká škola báňská - Technická univerzita Ostrava
Location
ÚK/Sklad diplomových prací
Signature
201200284
Abstract
The aim of this work is to focus on Security Management from the Data Life Cycle Perspective and provide a model that can be easy understand and to implement for any organizations type.
Information life cycle management enables us to understand our data, which is an extremely valuable business asset and which must be managed properly, to ensure business success and regulatory compliance. Understanding data management means classify and determine rules, responsibility and IT requested and determine the security policy’s requirement.
The work divided for two parts the theoretical part and the practical part.
The theoretical part include (the description of some theories and methods related to information security, description areas effects on information security and the description of the relation between data life cycle and the information security, and description of the model based on data life cycle and its processes)
The practical part is the implementation where the model will be in real action with one organization named Libya insurance company.
Description
Import 02/12/2011
Subject(s)
business scenario, threats, audit, plan, security policy, authentication, authorization, access control