We are here with you hands in hands to facilitate your learning & don't appreciate the idea of copying or replicating solutions. Read More>>

Looking For Something at vustudents.ning.com? Click Here to Search

www.bit.ly/vucodes

+ Link For Assignments, GDBs & Online Quizzes Solution

www.bit.ly/papersvu

+ Link For Past Papers, Solved MCQs, Short Notes & More


Dear Students! Share your Assignments / GDBs / Quizzes files as you receive in your LMS, So it can be discussed/solved timely. Add Discussion

How to Add New Discussion in Study Group ? Step By Step Guide Click Here.

n this modern era of technology where the business are mostly relaying on the technology with different motives particularly to provide ease of access to the customers and the stakeholders and hence adding the value to the business, however by the everyday passing the confidentiality, integrity and availability of the sensitive data is becoming more complex to manage. There are different frameworks and standards related to information security which are being followed by the ICT based businesses, still yet there are some lacks in the implementation are found even after getting certified like IS027001, which leads towards the some incidents related to information security and hence effecting the business.

 

In your opinion how such situations (incidents) can be handled and avoided at the maximum your suggestions are required and your response must be not more than 5 point and must be related to the topic (Successful implementation of an Information Security framework and standards to reduce the incidents at the maximum)

+ How to Follow the New Added Discussions at Your Mail Address?

+ How to Join Subject Study Groups & Get Helping Material?

+ How to become Top Reputation, Angels, Intellectual, Featured Members & Moderators?

+ VU Students Reserves The Right to Delete Your Profile, If?


See Your Saved Posts Timeline

Views: 1075

.

+ http://bit.ly/vucodes (Link for Assignments, GDBs & Online Quizzes Solution)

+ http://bit.ly/papersvu (Link for Past Papers, Solved MCQs, Short Notes & More)

+ Click Here to Search (Looking For something at vustudents.ning.com?)

+ Click Here To Join (Our facebook study Group)

Replies to This Discussion

share your ideas

Please Discuss here about this GDB.Thanks

Our main purpose here discussion not just Solution

We are here with you hands in hands to facilitate your learning and do not appreciate the idea of copying or replicating solutions. Read More>>

 

Note:-

For Important Helping Material related to this subject (Solved MCQs, Short Notes, Solved past Papers, E-Books, FAQ,Short Questions Answers & more). You must view all the featured Discussion in this subject group.

For how you can view all the Featured discussions click on the Back to Subject Name Discussions link below the title of this Discussion & then under featured Discussion corner click on the view all link.

Or visit this link 

Click Here For Detail.

&

.•°How to Download past papers from study groups°•.

 

Please Click on the below link to see…

.... How to Find Your Subject Study Group & Join .... 

share ur ideas over here:) :)

ANY HINT FOR THIS  GDB ,ONLY ONE DAY LEFT

PLEASE SHARE YOUR IDEAS QUICKLY AS POSSIBLE.

how to handle incidents related to information security? we have to answer this.

In my opinion such situations (incidents) can be handled and avoided when:

1. The organization must concern with the protection of its information assets and the purpose of information should devise to be communicating for security policy to concern its own organization.

2. An organization must have physical, logical, environment or personal data for consuming security.

3. An organization must have knowledge about security authority and employee should have the security awareness.

4. The legally authorized organization must have series of security program which must be checked on regular basis and organization must conduct periodic review to ensure that the assets associated with the information systems function are maintain sufficiently.

5. The protection of information must relying on the interest and communication in order to avoid any harmful information resulting and the purpose of privacy on personal information should have availability, confidentially and integrity from failure.

Awara Pagal Dewana  thanks for sharing 

Note for All Members: You don’t need to go any other site for this assignment/GDB/Online Quiz solution, Because All discussed data of our members in this discussion are going from here to other sites. You can judge this at other sites yourself. So don’t waste your precious time with different links.

Dear Students Don’t wait for solution post your problems here and discuss ... after discussion a perfect solution will come in a result. So, Start it now, replies here give your comments according to your knowledge and understandings....

can somebody tell me what exactly needed.
incident handling or implementation of security framework and standards.

RSS

Latest Activity

+ ! ! ! ! ! ! BaDd TamEeZ replied to zohaib iftikhar's discussion ...* NASEEB TAK RASAI ...*
7 minutes ago
+¢αяєℓєѕѕ gιяℓ replied to +¢αяєℓєѕѕ gιяℓ's discussion Best Places To Propose Someone :-P
9 minutes ago
+¢αяєℓєѕѕ gιяℓ replied to +¢αяєℓєѕѕ gιяℓ's discussion MCM301 Quiz Nov 19, 2019 12:00 AM Nov 20, 2019 11:59 PM in the group MCM301 Communication skills
13 minutes ago
+¢αяєℓєѕѕ gιяℓ replied to +¢αяєℓєѕѕ gιяℓ's discussion CS408 Human Computer Interaction Online Quiz No 01 Fall 2019 Solution Discussion Last Date: 21-11-2019 in the group CS408 Human Computer Interaction
14 minutes ago
zohaib iftikhar replied to zohaib iftikhar's discussion ...* MARD AUR AURAT KA GUNAH ...*
30 minutes ago
Profile IconAhtisham Hassan Qureshi and AYESHA KHATOON joined + M.Tariq Malik's group
1 hour ago
+ daShiNg DudE꧂ updated their profile
2 hours ago
+ ! ! ! ! ! ! ! ! ! AG liked Moji's discussion CS 502 Assignment no 2
4 hours ago
Profile Iconosama butt, Umar Ahmed, MUHAMMAD MUZAMMIL BHUTTA and 8 more joined Virtual University of Pakistan
4 hours ago
Abdul Majid Jamil posted a photo
5 hours ago
Moji posted discussions
6 hours ago
+ ! ! ! ! ! Dîxîě Dûsť꧂ updated their profile
6 hours ago
+ ! ! ! ! ! ! maho+++ liked Azhar Sagar's discussion How to make srs Software Requirements Specification
7 hours ago
Aqsa Khan updated their profile
8 hours ago
+ IUUOƆƎUT + updated their profile
8 hours ago
+ M.Tariq Malik replied to Aijaz khan's discussion CS608 - Software Verification and Validation Assignment No. 2 Need Solution
8 hours ago
+ M.Tariq Malik liked Aijaz khan's discussion CS608 - Software Verification and Validation Assignment No. 2 Need Solution
8 hours ago
+ M.Tariq Malik replied to Waseem Aziz's discussion PROJECT MANAGEMENT (MGMT627)required Solution in the group MGMT627 Project Management
8 hours ago
+ M.Tariq Malik liked Waseem Aziz's discussion PROJECT MANAGEMENT (MGMT627)required Solution
8 hours ago
Ahsan Sandhu updated their profile
8 hours ago

Today Top Members 

© 2019   Created by + M.Tariq Malik.   Powered by

Promote Us  |  Report an Issue  |  Privacy Policy  |  Terms of Service