ka | en
Company Slogan TODO

Analysis of higher education in the field of information security Analysis results

Author: Vazha Chalauri
Annotation:

Annotation IT development level has contributed to its applicability in everyday life and in his work environment . In addition, the increased availability of information . Information gradually moved from paper to electronic format and had to be properly protected . The paper describes the principles and methods aimed at determining the level of information security , analysis and improvement . These methods are based on ISO / IEC 27001 standards for . All of the facility , as well as higher education are facing the threat of such an unauthorized leak of information , hacking, and other emergency situations . It is therefore necessary to include a number of high-level information security processes : risk assessment , distribution of responsibilities , to be taken assets , periodically repeating this cycle , etc. That is why it is necessary to improve the university management system of higher education institutions . Iv been selected for the research facility . Javakhishvili State University . The main objective of the TSU special structure model of information security management . Research and analysis of the main components of the risk assessment , management, and analysis . The risk is the likelihood of the outcome , which represents the deviation of the planned / expected result and a negative impact on the institution's goals . While risk management is a single , continuous and developing process , which takes part in the establishment of each employee within its authority . As for the risk analysis it can be implemented in different ways , but it is mainly classified as follows : 1.raodenobrivi . 2.khariskhobrivi . 3 combined . It belongs to the risk of any asset or group of assets which is responsible for one or several persons . Asset is anything that has value to the organization and therefore requires protection . Identify the assets to remember that the information system does not only consist of hardware and computer programs .


Lecture files:

ინფორმაციული უსაფრთხოების ანალიზი უმაღლეს საგანმანათლებლო სფეროში ანალიზის შედეგები [ka]

Web Development by WebDevelopmentQuote.com
Design downloaded from Free Templates - your source for free web templates
Supported by Hosting24.com