Information Security – Protection of Computer Systems
Information Security – Documentation Security
- Unauthorised access and/or intrusion to the economic operator's computer systems and or programs
- Deliberate destruction or loss of relevant information
Information Security – Documentation Security
- Misuse of the economic operator's information system to endanger the supply chain.
- Deliberate destruction or loss of relevant information
Information Security – Solution
IT security Policy, Procedures & Standards - ISO 27001 certification
- Information Security Assessment by Information security officer
Procedures for granting Access/ withdrawal rights to Authorized Persons;
- Password protection on all PC Stations and possibly on important programmes
- Limit access to data, server rooms on need to know basis to authorised persons;
- Perform tests intrusion (unauthorized access) at regular intervals and record
Using encryption software where appropriate;
- Firewalls;
- Anti-virus protection;
Implement procedures for dealing with Security Threat incidents.
No comments:
Post a Comment