Explore BrainMass
Share

information security

This content was STOLEN from BrainMass.com - View the original, and get the already-completed solution here!

Please find an article or website about information security.
Provide an introduction, and select various aspects of the article or Web site. Describe each aspect, providing comments on the usefulness, validity or appropriateness of the article or Web site. The evaluation should provide details, examples and/or reasons for your viewpoint.

© BrainMass Inc. brainmass.com October 16, 2018, 11:16 pm ad1c9bdddf
https://brainmass.com/computer-science/operating-systems/information-security-252818

Solution Preview

For the purpose of this assignment, I will chose the following website: www.bsigroup.com and the following article in the website: http://www.bsigroup.com/en/Standards-and-Publications/Industry-Sectors/ICT/Information-Security/About-Information-Security/

The article title is: "About Information Security"

Introduction: The article on the above mentioned webpage provides a good overview about "information security", a simple and clear definition about information security, its key characteristics, importance in the organization as well as importance of industry standards or formal certification in the field of information security. The article discusses the need and importance of information security in a detailed manner and discusses how security risks and requirements can be assessed.

Evaluation of various aspects of the article:

The article starts with a layman definition of information security in an ...

Solution Summary

Please find an article or website about information security.
Provide an introduction, and select various aspects of the article or Web site.

$2.19
Similar Posting

Information Security

I am currently working in the accounting department and I was asked to describes the information security issues facing your industry and your organization; reviews legal/regulatory requirements/constraints; analyzes available technological and procedural mitigants, identify best practices; and frame your plan to manage the risks.

View Full Posting Details