Information security management
Introduction
- Emails are most widely used communication tool that is used in the corporate world over decades
- It allows making the best possible use of it to communicate and work in the
workplace
- It is imperative to make the tools secure with different securing policies and improvising as necessary
The components of official mail security policy
Data confidentiality
- Data availability and accessibility
- Data integrity
- Data authenticity
- Web management,
- Technological enablement
- Automatic updates
Discussion on the components
- During making and implementation of the security policy of an official email confidentiality about the data is taken under consideration as it is the most crucial aspect of using email.
- Availability and accessibility are the two finest components that are important in the policy.
- It is one of the major components as it takes place in the policy development crucially to make the components integrated together to make an effective use of the official email
Conclusion
- Data authenticity and other notions related to data security are the components of security policy
- It helps in the effective and systematic development of the policy
- Web management, technological enablement and automatic updates can be incorporated through information strategic systems
References
- Layton, T. P. (2016). Information Security: Design, implementation, measurement, and compliance. Auerbach Publications
- Mbowe, J. E., Msanjila, S. S., Oreku, G. S., & Kalegele, K. (2016). On Development of Platform for Organization Security Threat Analytics and
Management (POSTAM) Using Rule-Based Approach. Journal of Software Engineering and Applications, 9(12), 601.
- Peltier, T. R. (2016). Information Security Policies, Procedures, and Standards: guidelines for effective information security management. Auerbach Publications.