Monday, October 28, 2019

Information Security

Information Security – Protection of Computer Systems

  • Unauthorised access and/or intrusion to the economic operator's computer systems and or programs
  • Deliberate destruction or loss of relevant information

Information Security – Documentation Security

  • Misuse of the economic operator's information system to endanger the supply chain.
  • Deliberate destruction or loss of relevant information
Information Security – Solution

IT security Policy, Procedures & Standards - ISO 27001 certification
  • Information Security Assessment by Information security officer
Procedures for granting Access/ withdrawal rights to Authorized Persons;
  • Password protection on all PC Stations and possibly on important programmes
  • Limit access to  data, server rooms on need to know basis to authorised persons;
  • Perform tests intrusion (unauthorized access) at regular intervals and record
Using encryption software where appropriate;
  • Firewalls;
  • Anti-virus protection;
Implement procedures for dealing with Security Threat incidents.

No comments:

Post a Comment

Featured Post

PLASTIC - EPR (Extended Producer Responsibility)

  Plastic is a miracle material. Thanks to plastics, countless lives have been saved in the health sector, and safe food storage has been re...