Thursday, April 15, 2010
Chapter 4 Q3 Summarise the five steps to creating an information security plan
Five steps to creating an information security plan:
1) Develop the information security policies
2) Communicate the information security policies
3) Identify critical information assets and risks
4) Test and reevaluate risks
5) Obtain stakeholder support
http%3A//cba.winthrop.edu/fosterk/MGMT661/BusinessPlugInB6_PPT.ppt
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment