Modelo de seguridad de la información
To implement a security model on corporate organizations, there are some essential steps that need to be taken into account in order to achieve adequate decision-making, thus increasing security levels on the information. This article makes a review on different configurations for security designs;...
- Autores:
-
Bonilla, Sandra M
González, Jaime A
- Tipo de recurso:
- Fecha de publicación:
- 2012
- Institución:
- Universidad de San Buenaventura
- Repositorio:
- Repositorio USB
- Idioma:
- spa
- OAI Identifier:
- oai:bibliotecadigital.usb.edu.co:10819/6365
- Acceso en línea:
- http://hdl.handle.net/10819/6365
- Palabra clave:
- Arquitectura de red
Aseguramiento de red
Políticas de seguridad
Seguridad informática
Computer security
Network architecture
Seguridad en computadores
Redes de computadores
Seguridad en redes
Seguridad en sistemas de información
Información
- Rights
- License
- Atribución-NoComercial-SinDerivadas 2.5 Colombia
Summary: | To implement a security model on corporate organizations, there are some essential steps that need to be taken into account in order to achieve adequate decision-making, thus increasing security levels on the information. This article makes a review on different configurations for security designs; it begins by identifying the informatics risks, which constitutes the first step for proper protection of data stream managed by organizations. It continues with the analysis and identification of the risks to mitigate their effect it they become real, and creating controls and security policies, which in turn can be easily quantified and designed according to all that has been established on previous steps, thus having and adequate control over the security risks. Finally a security model is presented, where the requirements are identified and the network architecture is developed |
---|