Font Size: a A A

HH Group Project Information Security Management Research

Posted on:2017-11-10Degree:MasterType:Thesis
Country:ChinaCandidate:J H ChiFull Text:PDF
GTID:2348330503993092Subject:Business Administration
Abstract/Summary:PDF Full Text Request
Recent years, internet finance has been under a significant growth than ever. The internet finance, being a new industry, has been strengthened rapidly. Meanwhile, with that comes an unprecedented challenge is the information & data safety. By ignoring the data safety would cause the tremendous impact on the operation, even worse to the big economic loss.To guarantee the joint benefit of the end-users & internet finance companies, it is necessary to protect information system stable and safety. The aim is to ensure no danger or risk of data & information in any circumstances.The essay is to study on the HH project, targeting studying and analysis of data safety protection aspect. By the research and analysis of data protection status in HH, to dig out the weakness and risk on data protection management. Meanwhile, the essay expands the research area on the existing problem of company management, for instance company rule, wok-flow, procedure etc. by study on these topic, to find out the adopting corresponding measures. The objective is to avoid the information disclosure and data leaking.This paper based on ISO27001 information security management system standard, combining the mature and advanced information security management tools, combined with the actual situation of HH group, propose targeted guidance and basic framework of information security, and the prospect of the implementation of the information security management work, in the current Internet economy high speed development, constantly improve the great situation of information construction, to effectively reduce the HH group of information security management, maximize guarantee its business interests to provide meaningful reference opinions, and for the same industry or other enterprises of the same magnitude of certain reference and reference value.
Keywords/Search Tags:Information Security, System, Process, Risk, Information Technology
PDF Full Text Request
Related items