lunes, 21 de octubre de 2013

Computer security should set standards to minimize the risks to information or infrastructure. These standards include hours of operation, restrictions on certain locations , approvals , denials , user profiles , plans , protocols and everything you need to allow a good level of security while minimizing the impact on worker performance and organizational generally and as a major contributor to the use of programs by programmers.
Computer security is designed to protect computer assets , among which are the following :
The computational infrastructure : An essential part for the storage and management of information and to the very functioning of the organization. The role of information security in this area is to ensure that the equipment works properly and anticipate in case of failure , theft , arson , boycotts , natural disasters, power failures or any other factor that threatens the infrastructure.
Users : Those who use technological infrastructure , communications area and manage information . Protect the overall system for use by the program can not compromise the security of the information and not the information handled or stored vulnerable.
Information : is the main asset . Use and resides in the computing infrastructure and is used by users.  

No hay comentarios:

Publicar un comentario