Talk With an Expert

Implementing an Information Security Program

Implementing an Information Security Program (PDF, 1.62MB)Published: 22 Aug, 2001
Created by
Kevin Nichols

Recently, there has been an increase in the awareness for the need within corporations (as well as within government agencies) to protect sensitive, proprietary and company secret information. Unauthorized modification, loss or compromise of such information could very well severely damage an organization's current operations; future or even put it out of business. However, the largest threat to an organization's computer information systems and the data they contain remains the trusted or authorized user. Since wide spread reports center on the threat posed by external threats, the internal threat may go relatively unnoticed or may be inadequately addressed as resources are spent countering the external threat. At the same time, many security measures that should be implemented to counter the internal threat are relatively inexpensive and also act to close up many holes that an external threat may rely on to gain and maintain unauthorized access to an organizations system and data.