{"title":"信息通信技术的技术应用、规则与信息安全挑战","authors":"Cumbal Renato, N. Maria","doi":"10.1109/APCASE.2015.74","DOIUrl":null,"url":null,"abstract":"This paper explains the importance of Information Security (IS) in the field of Information and Communication Technologies(ICT) as well as the use of concepts, standards and specialized tools, the application has become increasingly relevant for the organizations. Research and training in Information Security has an important role, since the preparation, defense and response to events that arise, strengthens the proper administration of the assets in the information environment. Likewise, the application of the appropriate roles of each user and the analysis of risks that lead to having more secure systems policies, hence the importance of certain introductory concepts such as Computer Security Incident Respone Team (CSIRT), which allow you the proper management of the Information Security and its corresponding implementation in this field.","PeriodicalId":235698,"journal":{"name":"2015 Asia-Pacific Conference on Computer Aided System Engineering","volume":"152 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Technologies' Application, Rules, and Challenges of Information Security on Information and Communication Technologies\",\"authors\":\"Cumbal Renato, N. Maria\",\"doi\":\"10.1109/APCASE.2015.74\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper explains the importance of Information Security (IS) in the field of Information and Communication Technologies(ICT) as well as the use of concepts, standards and specialized tools, the application has become increasingly relevant for the organizations. Research and training in Information Security has an important role, since the preparation, defense and response to events that arise, strengthens the proper administration of the assets in the information environment. Likewise, the application of the appropriate roles of each user and the analysis of risks that lead to having more secure systems policies, hence the importance of certain introductory concepts such as Computer Security Incident Respone Team (CSIRT), which allow you the proper management of the Information Security and its corresponding implementation in this field.\",\"PeriodicalId\":235698,\"journal\":{\"name\":\"2015 Asia-Pacific Conference on Computer Aided System Engineering\",\"volume\":\"152 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-07-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 Asia-Pacific Conference on Computer Aided System Engineering\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/APCASE.2015.74\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 Asia-Pacific Conference on Computer Aided System Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/APCASE.2015.74","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Technologies' Application, Rules, and Challenges of Information Security on Information and Communication Technologies
This paper explains the importance of Information Security (IS) in the field of Information and Communication Technologies(ICT) as well as the use of concepts, standards and specialized tools, the application has become increasingly relevant for the organizations. Research and training in Information Security has an important role, since the preparation, defense and response to events that arise, strengthens the proper administration of the assets in the information environment. Likewise, the application of the appropriate roles of each user and the analysis of risks that lead to having more secure systems policies, hence the importance of certain introductory concepts such as Computer Security Incident Respone Team (CSIRT), which allow you the proper management of the Information Security and its corresponding implementation in this field.