Talk With an Expert

Information Security: Handling Compromises

Information Security: Handling Compromises (PDF, 1.87MB)Published: 15 Aug, 2001
Created by:
Craig Bowser

As the Information Systems Security Manager (ISSM) for an organization within DoD, I am responsible for ensuring the overall security stance of our network. This includes physical security and network security. Part of maintaining our security stance is ensuring that information considered sensitive to national security does not reside on the unsecured network. Occasionally this information of this type is introduced onto the unsecured network and it is my job to create and implement the procedures that erase the data from the network to ensure it cannot be recovered if an unauthorized user gains access to our network. While the corporate sector may not be guarding national secrets, they are protecting valuable information such as trade secrets, financial documents and personal information.

Information Security: Handling Compromises