ka | en
Company Slogan TODO

Analysis of information security in the field of higher education

Author: marina merebashvili
Annotation:

Abstract Nowadays IT systems have become an essential component of the life of any university, an essential component for its management as well as a tool for educational processes. The aim of IT system nowadays is not only to ensure efficiency of university management and assure high quality of educational process but to support scientific research and to minimize the risk of taking unreasonable decisions and avoiding extra costs. An institution of higher education is an organizational structure with everchanging work flows. This is why it is necessary to constantly renew programs. IT facilitates to the innovations made at any University. Moreover, the more sophisticated the processes at a university evolve the more sophisticated are the required IT systems. High-technology growth requirements of an educational institution network computing resources protection. Current became a necessity for the security system, which implies the existence of the legal and normative basis, the formation of a new security concept, special measures for the development of safety procedures for planning, design, implementation of technical means to protect the information. All of the above information security at the University System kompontebi define common policy. Educational institutions in the information security specificity lies in the fact that a public institution of higher sastsavlebebli auditoriita constantly changing and "novice cyber criminals" active growth. Studies have shown that still has not been studied and established standards, which will ensure full security of information. Information security issues are becoming more and more relevant in almost every modern organization. Because of this, organizations often hire special companies / specialists in order to check the security of their organizations. Certain types of institutions, such as joint stock companies, in most cases, a number of departments are staffed by professionals who provide security norms, limits on their full functioning. Today, the field is still in the development stage and enjoys considerable popularity, especially in large organizations. The first chapter of the thesis deals with the structure and the information system security, system modules, infrastructure scheme. The second and third chapters deals with information security requirements, and their main sources of information security risks. As for the fourth yourself, there is considered an information security policy and management roles and responsibilities. The fifth and sixth chapters of the goal set out in the Information Security, performance and decision criteria, the information security management system efficiency measures. The seventh chapter deals with the analysis of data and evaluation of results. Finally, this paper sets out a simple method, which is available at the university's information security evaluation.


Lecture files:

ინფორმაციული უსაფრთხოების ანალიზი უმაღლეს საგანმანათლებლო სფეროში(ანალიზის მეთოდების შერჩევა) [ka]

Web Development by WebDevelopmentQuote.com
Design downloaded from Free Templates - your source for free web templates
Supported by Hosting24.com