Important: Use custom search function to get better results from our thousands of pages

Use " " for compulsory search eg:"electronics seminar" , use -" " for filter something eg: "electronics seminar" -"/tag/" (used for exclude results from tag pages)
Ask More Info Of  A Seminar Ask More Info Of A Project Post Reply  Follow us on Twitter
14-08-2012, 04:58 PM
Post: #1
13.6 Legal Aspects ppt
13.6 Legal Aspects


.ppt  13.6LegalAspects(2).ppt (Size: 230 KB / Downloads: 23)

Objectives

Corporate IT Security Policy:

Understand the need for a corporate information system security policy and the rĂ´le it would fill within an organisation.
Factors could include prevention of misuse, detection, investigation, procedures, staff responsibilities, disciplinary procedures.
Describe the content of a corporate information system security policy.
Describe methods of improving awareness of security policy within an organisation, cross-referencing to training and standards.

Disaster recovery management:

Describe the various potential threats to information systems, e.g. physical security; document security; personnel security; hardware security; communications security; software security. Understand the concept of risk analysis.
Understand the commercial need to ensure that an information system is protected from threat. Describe a range of contingency plans to recover from disasters and relate these to identified threats.
Describe the criteria used to select a contingency plan appropriate to the scale of an organisation and installation.

Corporate IT Security

Dependency on IT means the integrity and the safety of information kept is highly important.
Two possible threats to security are accidental and deliberate loss and damage.
Accidental: human error and natural disasters.
Deliberate: fraud, sabotage, arson and spying.
Threats to security come from within and from outside the organisation.
A Corporate IT Security Policy should be wide ranging enough to cover all eventualities.

IT Policy Statement

Covering the use of computers.
Users are to read and sign agreement to.
Organisations may run training courses for new employees who use computers.
Courses cover the main Acts regarding the use of computers in organisations.
It security implemented as a cornerstone of the organisation’s management.

Prevention of Misuse

Not allowing users access to the Operating System and settings.
Not allowing key files to be deleted.
Allowing restricted use of the Internet including Filtering and Firewalls.
Not allowing everyone access to the Internet and e-mail use.
Users need a user name and a password.
Users have access only to files they normally use in the course of their work.

Detection

Audit trails to discover where misuse has taken place and to identify the employee.
Specialist software that will identify an unusual request or unusual use and will flag a message to the security manager.
Software that allows the security manager to see who is working and who is playing.
A log of access can be saved to build a record of use about employees.

Investigation

Use of software to investigate and gather evidence against a mis-user of the system.
Important to have proper evidence against someone accused to ensure fair treatment and keep good industrial relations.
In serious cases of misuse the employee could be disciplined, dismissed, or the police involved in very serious cases.
17-12-2012, 01:14 PM
Post: #2
RE: 13.6 Legal Aspects ppt
to get information about the topic " LEGAL ASPECTS PPT" full report ppt and related topic refer the link bellow


http://seminarprojects.com/Thread-13-6-l...spects-ppt

http://seminarprojects.com/Thread-legal-...-questions
Rating 13.6 Legal Aspects ppt Options
Share 13.6 Legal Aspects ppt To Your Friends :- Seminar Topics Bookmark
Post Reply 

Marked Categories : legal dimension of computerization in ppt, legal aspects, legal aspects of security ppt,

[-]
Quick Reply
Message
Type your reply to this message here.


Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  xMax : Seminar Report and PPT seminar projects maker 2 502 17-05-2016 09:39 AM
Last Post: dhanabhagya
  MOBILE-TV ppt project girl 1 6,234 11-04-2016 10:26 AM
Last Post: mkaasees
  Mining Web Graphs for Recommendations ppt seminar ideas 8 4,373 09-04-2016 02:50 PM
Last Post: dhanabhagya
  Seminar On 3D Internet ppt seminar post 1 943 06-04-2016 12:50 PM
Last Post: mkaasees
  3D Internet : Seminar Report and PPT seminar projects maker 1 530 06-04-2016 12:49 PM
Last Post: mkaasees
  Ant Colony Optimization PPT seminar projects maker 1 1,324 24-03-2016 02:19 PM
Last Post: mkaasees
  Graphical Password Authentication ppt study tips 1 4,292 10-03-2016 12:45 PM
Last Post: mkaasees
  Arduino PPT seminar flower 1 1,796 24-02-2016 03:24 PM
Last Post: Guest
  php ppt dhanabhagya 0 165 09-02-2016 03:49 PM
Last Post: dhanabhagya
  Google Chrome Laptop : Seminar Report and PPT dhanabhagya 0 243 30-01-2016 11:57 AM
Last Post: dhanabhagya
This Page May Contain What is 13.6 Legal Aspects ppt And Latest Information/News About 13.6 Legal Aspects ppt,If Not ...Use Search to get more info about 13.6 Legal Aspects ppt Or Ask Here

Options: