Font Size: a A A

Study On Information Security Management Optimization Of CETCSS Company

Posted on:2020-03-20Degree:MasterType:Thesis
Country:ChinaCandidate:Y Y XuFull Text:PDF
GTID:2439330596488024Subject:(professional degree in business administration)
Abstract/Summary:PDF Full Text Request
The popularity of information technology,Internet and mobile applications has become an important part of business management.The application of new technologies also let enterprises face to more information security risks.As a pioneer user of this new technologies,the software and information technology service industry has been strengthening its information security management in order to deal with information security issues in recent years.CETCSS as a young and high-starting software and information technology service company,when actively exploring the business,it also troubled some unknown information security issues.When face to the challenge of the external environment and the pressure of internal management,how should CETCSS improve its information security management?This paper research on information security management optimization,survey and summary the major information security issue of CETCSS.Utilize information security management theory and tools,analysis issues of information security policy and organization,HR security,operation and maintenance security,system acquisition development and maintenance.Give the solution of information security improvement.Provide improvement approach on information security policy and organization,HR security,operation and maintenance security,system acquisition development and maintenance.Make the schedule of this solution,explain the key point and control point,ensure the solution can be implemented effectively.Through the research on information security management improvement of CETCSS,it not only improves the company’s management ability on information security,but also reduce the business risk.Meanwhile,it will provide best practices for those similar company.
Keywords/Search Tags:information security management, ISO27000, process optimization
PDF Full Text Request
Related items