logo

Information security training | Essay

   

Added on  2022-08-28

2 Pages528 Words23 Views
Information security training
This is an informative text regarding the training upcoming soon. The training will be touching
on Advanced Technologies Inc. 's information security. As a general concept, information is
what is conveyed by a particular sequence. Information can be electrical or physical. Information
security, therefore, is the practice of preventing unauthorized infringement in the flow sequence
of ideas conveyed. Information security ensures the prevention of unauthorized use, inspection,
destruction, recording or access of information.
This training is very important. It will highlight and remind each one in the Advanced
Technologies Inc. company risks and threats around ever-advancing and evolving growth in
information flow and cybersecurity. This also covers the need to know about deliberate moves
by internal staff to illegally acquire companies’ sensitive information by any possible loopholes
available and use to harm the firm.
Availability, integrity, and confidentiality is the basic description of secure information.
Misplaced Information or information falling into appropriate users’ hands contradicts basic
description. This can lead to damage, misuse, stealing or even attacks hence a reiteration of the
need of everyone in the organization knowing the risks and take appropriate action to ensure
he/she doesn’t subject the firm to dangers and losses accrued with their action or inaction.
The companies’ system can be secure enough but employees’ actions and inaction can be a
major threat. There is the adoption of NIST special publication 800-50 to help with the
information security approach. For the case of action, the training will cover the essential actions
on users to ensure each one knows their duties and possible outcomes. The training will also
notify trainees on possible actions by ATI on actions contravening the policies. On the other

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
The email Advisory | Information Security Training
|4
|629
|16

Information Security Awareness Training | PPT
|20
|1073
|57

Security Awareness Program | Advanced Topologies Inc
|11
|2188
|22