Font Size: a A A

Application Research On Enterprise System Construction And Implementation Of The Isms

Posted on:2012-04-08Degree:MasterType:Thesis
Country:ChinaCandidate:X LiuFull Text:PDF
GTID:2248330371965214Subject:Project management
Abstract/Summary:PDF Full Text Request
With the increasingly rapid development of computer and internet, information technology has penetrated into every corner of the world, changing people’s work and lifestyle. Business development of modern enterprises and commercial institutes has become more and more dependent on information system, open and complex information system faces various risks, and information security has become vital. Information security problem arises in every country in the world no matter on social dimension or commercial sector.Modern enterprises improve time to market by means of information system. They manage upstream and downstream business partner and customer relation via information means, at meanwhile increasing efficiency and decreasing stock, and gradually forming business model of brand and efficiency as core competence, and feature of this business model has determined that information system possesses data with cash value, which includes sales date, customer information, business order, business process data etc, data loss and abuse means direct economic losses. While the increasingly huge enterprise information system is facing menace all the time from both inside and outside, such as Trojan, virus, worm, malicious user etc. series of problems like enterprice inside information security strategy deficiency, procedure absence, security conscience shortage, lack of technology has become more and more apparent.This article probes into above mentioned problem, and discusses enterprise ISMS system setup and the core risk analysis method.based on reading large volume of documents home and abroad, combined with the writer’s long-cumulated experience, by analysis of enterprise security requirement, this article has put forward multi-dimension information security system and enterprise security architecture designing method and application in reality. I wish the research on this subject will help reimprovement on enterprise information security management system.
Keywords/Search Tags:Information security, Risk assessment, ISMS
PDF Full Text Request
Related items