Thursday, April 15, 2010

Chapter 4 Q3 Summarise the five steps to creating an information security plan



Five steps to creating an information security plan:


1) Develop the information security policies


2) Communicate the information security policies


3) Identify critical information assets and risks


4) Test and reevaluate risks


5) Obtain stakeholder support

http%3A//cba.winthrop.edu/fosterk/MGMT661/BusinessPlugInB6_PPT.ppt

No comments:

Post a Comment