The IT Law Wiki
No edit summary
 
(2 intermediate revisions by the same user not shown)
Line 1: Line 1:
== Definition ==
+
== Definitions ==
   
A '''security program''' is a comprehensive set of plans, policies, procedures, tools, and materials designed to address the [[threat]]s a specific organization is facing.<ref>This page uses content from the [https://wiki.internet2.edu/confluence/display/itsg2/Glossary Information Security Guide 2 - Glossary,] which is made available under the [http://creativecommons.org/licenses/by/3.0/ Creative Commons Attribution License 3.0 Unported.]</ref>
+
A '''security program''' is a comprehensive set of plans, policies, procedures, tools, and materials designed to address the [[threat]]s a specific organization is facing.<ref>This definition uses content from the [https://wiki.internet2.edu/confluence/display/itsg2/Glossary Information Security Guide 2 - Glossary,] which is made available under the [http://creativecommons.org/licenses/by/3.0/ Creative Commons Attribution License 3.0 Unported.]</ref>
  +
  +
A '''security program''' is
  +
  +
{{Quote|[a] systems [[program]] that controls [[access]] to [[data]] in [[file]]s and permits only [[authorized]] use of [[terminal]]s and other related equipment. Control is usually exercised through various levels of [[safeguard]]s assigned on the basis of [[need to know]].<ref>[[Auditing and Financial Management: Glossary of EDP Terminology]], at 15.</ref>}}
   
 
== References ==
 
== References ==
 
<references />
 
<references />
  +
  +
== See also ==
  +
  +
* [[Information security program]]
 
[[Category:Security]]
 
[[Category:Security]]
 
[[Category:Definition]]
 
[[Category:Definition]]

Latest revision as of 00:06, 4 September 2012

Definitions[]

A security program is a comprehensive set of plans, policies, procedures, tools, and materials designed to address the threats a specific organization is facing.[1]

A security program is

[a] systems program that controls access to data in files and permits only authorized use of terminals and other related equipment. Control is usually exercised through various levels of safeguards assigned on the basis of need to know.[2]

References[]

See also[]