Information security management
PDF (Polish)
HTML (Polish)
TIF (Polish)

Keywords

informacja
ochrona danych
system bezpieczeństwa informacji
zarządzanie information
data protection
security of information system
management

How to Cite

Beskosty, M. (2017). Information security management. The Study of Security, (2), 163–173. https://doi.org/10.34858/snb.2.2017.012

Abstract

The purpose of this article is to present the question of effective protection of information security management. The article begins with an explanation of the concept what the information is, its attributes and features. Moreover, the paper describes the models of security systems and the security policy in a company. Besides, the author shows what measures should be applied to manage information and what to do to implement security system which is both efficient and permanent.
https://doi.org/10.34858/snb.2.2017.012
PDF (Polish)
HTML (Polish)
TIF (Polish)
Creative Commons License

This work is licensed under a Creative Commons Attribution 4.0 International License.

Copyright (c) 2021 Array

Downloads

Download data is not yet available.