We are here with you hands in hands to facilitate your learning & don't appreciate the idea of copying or replicating solutions. Read More>>

Looking For Something at vustudents.ning.com? Click Here to Search


+ Link For Assignments, GDBs & Online Quizzes Solution


+ Link For Past Papers, Solved MCQs, Short Notes & More

Dear Students! Share your Assignments / GDBs / Quizzes files as you receive in your LMS, So it can be discussed/solved timely. Add Discussion

How to Add New Discussion in Study Group ? Step By Step Guide Click Here.

n this modern era of technology where the business are mostly relaying on the technology with different motives particularly to provide ease of access to the customers and the stakeholders and hence adding the value to the business, however by the everyday passing the confidentiality, integrity and availability of the sensitive data is becoming more complex to manage. There are different frameworks and standards related to information security which are being followed by the ICT based businesses, still yet there are some lacks in the implementation are found even after getting certified like IS027001, which leads towards the some incidents related to information security and hence effecting the business.


In your opinion how such situations (incidents) can be handled and avoided at the maximum your suggestions are required and your response must be not more than 5 point and must be related to the topic (Successful implementation of an Information Security framework and standards to reduce the incidents at the maximum)

+ How to Follow the New Added Discussions at Your Mail Address?

+ How to Join Subject Study Groups & Get Helping Material?

+ How to become Top Reputation, Angels, Intellectual, Featured Members & Moderators?

+ VU Students Reserves The Right to Delete Your Profile, If?

See Your Saved Posts Timeline

Views: 1097


+ http://bit.ly/vucodes (Link for Assignments, GDBs & Online Quizzes Solution)

+ http://bit.ly/papersvu (Link for Past Papers, Solved MCQs, Short Notes & More)

+ Click Here to Search (Looking For something at vustudents.ning.com?)

+ Click Here To Join (Our facebook study Group)

Replies to This Discussion

share your ideas

Please Discuss here about this GDB.Thanks

Our main purpose here discussion not just Solution

We are here with you hands in hands to facilitate your learning and do not appreciate the idea of copying or replicating solutions. Read More>>



For Important Helping Material related to this subject (Solved MCQs, Short Notes, Solved past Papers, E-Books, FAQ,Short Questions Answers & more). You must view all the featured Discussion in this subject group.

For how you can view all the Featured discussions click on the Back to Subject Name Discussions link below the title of this Discussion & then under featured Discussion corner click on the view all link.

Or visit this link 

Click Here For Detail.


.•°How to Download past papers from study groups°•.


Please Click on the below link to see…

.... How to Find Your Subject Study Group & Join .... 

share ur ideas over here:) :)



how to handle incidents related to information security? we have to answer this.

In my opinion such situations (incidents) can be handled and avoided when:

1. The organization must concern with the protection of its information assets and the purpose of information should devise to be communicating for security policy to concern its own organization.

2. An organization must have physical, logical, environment or personal data for consuming security.

3. An organization must have knowledge about security authority and employee should have the security awareness.

4. The legally authorized organization must have series of security program which must be checked on regular basis and organization must conduct periodic review to ensure that the assets associated with the information systems function are maintain sufficiently.

5. The protection of information must relying on the interest and communication in order to avoid any harmful information resulting and the purpose of privacy on personal information should have availability, confidentially and integrity from failure.

Awara Pagal Dewana  thanks for sharing 

Note for All Members: You don’t need to go any other site for this assignment/GDB/Online Quiz solution, Because All discussed data of our members in this discussion are going from here to other sites. You can judge this at other sites yourself. So don’t waste your precious time with different links.

Dear Students Don’t wait for solution post your problems here and discuss ... after discussion a perfect solution will come in a result. So, Start it now, replies here give your comments according to your knowledge and understandings....

can somebody tell me what exactly needed.
incident handling or implementation of security framework and standards.


© 2020   Created by +M.Tariq Malik.   Powered by

Promote Us  |  Report an Issue  |  Privacy Policy  |  Terms of Service