Information Security Company Mexico

Page 1

What is Information Security? When people think of information or data, they often think ‘computers’- mainframes, PCs and so forth. It is true that much is held or processed by computers. Information can be in many channels:   

PAPER BASED ELECTRONIC VERBAL

For instance, the paperwork left harmlessly on your desk or workstation contains information. Whether it is a teller transaction slip, a Bank policy statement or a memo, these all deserve some degree of confidentiality and therefore, require some protection. Next, of course, is the electronic media. Diskettes, Magnetic tapes, Zip disks, CD-ROMs, portable or laptop computers, all often contain sensitive information. And another important issue, which is the routine office conversation. When you speak on the phone, or have a face-to-face discussion with a colleague or a customer, you are passing on information. For any doubt just click here Information Security Company Mexico

Data Classification It is very important to know that we classify the information by the owner to different categories. You should know how to deal with each data classification and apply the proper protection to the information. The categories are:   

Public – Any information that has been published or obtained from published sources. Confidential – Information that is available to all staff within an organization, but is not public such as meeting minutes, projects within an organization, and telephone directories. Highly Confidential – Information with a limited circulation that has significant value and mission critical to an organization such as strategies, contracts, and


Exposure and Controls When dealing with security problems & issues, one should always comes to the central values of exposure and controls. But what are they?

Exposures An exposure is a point of risk, where loss or damage might occur. That loss or damage could come in different ways, loss of information, loss of privacy, change to correct information making it invalid, embarrassment to the organization or its customer, and others. How large that exposure is depends on the value of the item at risk. If, for example, you lose your wallet with your credit cards inside, the risk may be limited to the size of your available credit limit. If, however, if at work you lose your User ID and password, with access to transfer funds around the world, you could lose millions of dollars for the Bank and its Customers, not to mention your job as well.

Controls Effective and well-managed Control reduces risk. They come in many forms like Passwords, signatures, encryption (message scrambling and unscrambling), etc but all with the same goal. They prevent, or at least reduce, the possibility of loss or damage. There are no controls or security systems which can absolutely guarantee 100% protection, but they do minimize the risk. Furthermore, controls must be balanced against the level of risk. In other words, they must be less expensive than the item they are trying to protect.


For more information please visit: http://www.webimprints.com/ Contact Us At: Mexico Phone: +52 556 583 4245 India Phone: +91 11 45566845 Email: info@webimprints.com Spanish website: www.webimprints.com MEXICO 240, Lope De Vega, Polanco, Mexico D.F 11570 DUBAI 702, Smart Heights Tower, Dubai INDIA 609, Six Floor, Aggarwal Cyber Tower 1 Neetaji Subhash Place, Delhi


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.