Dissertation > Excellent graduate degree dissertation topics show

Study on Information Security of C Company

Author: ZhuYuanWei
Tutor: WangLiuShi
School: Lanzhou University
Course: Business Administration
Keywords: Information Security Quality Management Theory (PDCA) Information Technology Infrastructure Library (ITIL) Control Objectives for Information and related Technology (COBIT) Information security certification standards (ISO27001/ISO27002)
CLC: F270.7
Type: Master's thesis
Year: 2011
Downloads: 65
Quote: 0
Read: Download Dissertation

Abstract


Information security is one of the basic protections for business units. In the 21st century, as China joined the WTO, increasing the degree of internationalization, more and more foreign multinational companies have entered China. Since the domestic and international aspects of the cultural differences and the different environment, there’s a big challenge for every multinational company to conduct business in China while making enterprise information security as the first priority task.This paper analyzes the information security management status of company C, though the company’s information security system has been deployed within the headquarters in US, the China branches encountered many new problems during the deployment. How to build a security system for localized information becomes a problem of the company C. In this context, according to the introduction of information security management theory and best practices, it describes how these theoretical methods applied to the C Company headquarters in China. Throughout the system, I raised double original information security systems, namely: information security management system and common information technology security system. This is an attempt to manage integration into the technology, put forward in information security technology system at the same time, the introduction of information security management system, so well is that from the traditional information security system in the sense of isolation faced by the enterprise, better access to management support and participation. Only in this way information security within the enterprise will be bear fruit.This paper focuses on enterprise information security dual systems which’s implemented by AP 2 OC as a guideline, the main body of the paper is divided into five levels, follow the questions, analyze and solve problems of the logical framework, from concept to concrete, to the general, gradual in-depth, step by step to start on. At the same time for each system involved in all aspects of the system described in simple terms. To solve the various problems in the process, the introduction of maturity model, each solution to the problem is divided into six levels, in order to find in the course of the current position and areas for improvement, until finally achieve the ultimate goal.Finally, the release results illustrate information security system’s advantage and inadequacies in practice, I also raised several recommendations to improve it contiously.

Related Dissertations

  1. The Research of Vector CAD Electronic Drawing Protection System,TP391.72
  2. Study on Strategy of Our National Confidential E-government Nets’ Information Security Construction,D630
  3. Research and Design on Asymmetric Encryption and Decryption Algorithm Based on FFTT,TP309.7
  4. Research and Application on Security Authentication Technologies in Internet of Things,TN929.5
  5. Digital Information Resources System Security Risk Assessment,G353.1
  6. Design and Implementation of the online bidding system for information security,TP393.08
  7. Optical Image Encryption Algorithms Based on Fractional Mellin Transform,TP309.7
  8. Research on Intelligent Monitoring and Management System Technique Based on the Wireless Sensor Networks,TP212.9
  9. Trojan Principle Analysis and System Implementation,TP309.5
  10. Power grid enterprise power marketing business risk management applied basic research,F426.61
  11. Design and Implement of an Encrypted File Management System,TP309.7
  12. Information Secuerity Operation Management of Telecom,TP309
  13. Research and Realization on Dezhou SI-MIS,TP311.52
  14. Design and Analyses of Concurrent Signature Schemes Based on Designated Verifiers,TN918.2
  15. GanSu MCC Mobile Data Network Secuirty Evaluation and Solution Strategy,F626
  16. Research on Our National Information Security and It’s Strategy Under the Condition of Network Information,F49
  17. Research on Self-adapting Watermaking for Color Image Based on DCT,TP309.7
  18. Based on the wireless network \,TP311.52
  19. Information Security Strategy of Trade in Electricity Market Based on Time-Space Characteristics Model,TM73
  20. Intranet Design and Implementation of Network Security System,TP393.08

CLC: > Economic > Economic planning and management > Enterprise economy > Economic theory and methods > Management of modern enterprises
© 2012 www.DissertationTopic.Net  Mobile