answersLogoWhite

0


Best Answer

Because successful implementation of any IT project depends on the commitment and involvement of executive management, also referred to as the "tone at the top". the same is true of IT security. When senior management shows its commitment to IT security, it becomes important to others too. It makes users aware that insecure practices and mistakes will not be tolerated.

User Avatar

Wiki User

11y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Why should information security be of prime concern to management?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Functions of information security to an organisation?

The security of data and information is of vital importance to any organization and it is therefore a business decision as to what information should be protected and to what level. The business's approach to the protection and use of data should be contained in a security policy to which everyone in the organization should have access and the contents of which everyone should be aware. The system in place to enforce the security policy and ensure that the business's IT security objectives are met is known as the Information Security Management System (ISMS). Information Security Management supports corporate governance by ensuring that information security risks are properly managed.


What project management tasks should Kelvin perform before his next meeting?

Kelvin should call a meeting of that involves every committee of interest and make themn aware of the project plan -- communicate, educate and involve everyone that should be concern of the project. After all, information security is the responsibility of everyon in the organization.


Will titanium set off airport security alarm?

If you have nothing to hide why should it concern you?


Who is ultimately responsible for the security of information in the organization?

I think this is best answered by the old aphorism that security is everyone's responsibility. In practice there is likely to be a member of the Board who has the overall accountability and this person may be termed a Senior Information Risk Owner. Alternatively it may be the Chief Information Officer, the Chief Finance Officer or the Chief Executive Officer who has this accountability. Such officers are usually advised by experts in security and these may fall under the overall management of a Chief Information Security Officer. For best practice, everyone in the organisation should be given an appropriate level of security awareness training.


What security management courses are available in NSW?

You can find a range of security management courses in Australia that suit your need. You should probably inquire online or go to a school for it on campus.


If you suspect information has been improperly or unnecessarily classified?

If you suspect information has been improperly or unnecessarily classified, what should you do first? Declassify the information, pending review by the original classification authority. Initiate a formal challenge. Discuss your concerns with your security manager or supervisor.


Should hoods be banned in public places?

Yes, unless there is a specific concern about security, such as in a bank, you should have the right to wear a hood if desired.


What are some of the business benefits and management challenges of network computing?

Some management challenges of network computing involve security and access to the documents. Managers sometimes have a hard time controlling the information that certain people should receive within the network.


Which of the seven domains of a typical IT infrastructure requires personal and executive management support outside of the IT or information system security organizations?

I would say All. Every aspect of each domain should be accomplished with the informed consent of management. This information is garnered by receiving input from all levels of personnel within the organization.


Where should you search on WikiAnswers for information about disaster management?

The WikiAnswers category 'Natural Disasters' is a place where you are likely to find information about disaster management.


The types of information that could affect confidentiality and security and how to handle these?

The types of information that could affect confidentiality and security include personal and private, business, and classified or government information. Such information should be labelled as confidential and should be safeguarded accordingly.


The types of information that could affect confidentiality and security and how to handle?

The types of information that could affect confidentiality and security include personal and private, business, and classified or government information. Such information should be labelled as confidential and should be safeguarded accordingly.