0% found this document useful (0 votes)
172 views6 pages

Information Assurance Program

Our organization provides online privacy services including computing, telecommunication, and network facilities. Access to physical areas and systems is restricted to authorized members only. The complete network is password protected and monitored 24/7 with alarm systems. Software and systems are regularly upgraded to ensure quality services. The objectives of the information assurance program are to assure security, confidentiality, and protection against threats for customer information. Action steps include assessing program requirements and upgrading the project to overcome risks.

Uploaded by

sadia
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
172 views6 pages

Information Assurance Program

Our organization provides online privacy services including computing, telecommunication, and network facilities. Access to physical areas and systems is restricted to authorized members only. The complete network is password protected and monitored 24/7 with alarm systems. Software and systems are regularly upgraded to ensure quality services. The objectives of the information assurance program are to assure security, confidentiality, and protection against threats for customer information. Action steps include assessing program requirements and upgrading the project to overcome risks.

Uploaded by

sadia
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 6

Information Assurance Program

FPPT.com
Introduction
• Our organization is based on providing online privacy services. The organization is working in
computing, telecommunication, and network facilities. It also provides selection, management,
application and working of computing and communication equipment.
• The facilities are provided to physically secure areas and access is only given to few authorized members.
Computing and telecommunication sites and technical areas will be logged automatically.
• The complete network of system is password protected. Our organization also provides a strong alarm
system. Alarm system is monitored 24 hours and 7 days a week.
• Round the clock monitoring provides any unauthorized interruption, fire detection, flood detection etc. In
some cases it also provides video surveillance.
• Software of the systems and related products are upgraded on regular basis. To ensure continuing quality
services vendor bug fixes is installed. On weekdays operators deal with alerts, networks and any problems
that arise within the system. Special working equipments have been built to detect the failure of even a
single unit. Replacement parts’ stock has been reserved to maintain servers and networks.
Vision and Mission Statements
Vision statement
• To be a supportive information security provider that helps
the small and large businesses all over the world.
Mission Statement:
• Our mission is to provide extraordinary and managed services
by high quality and secure IT system. It allows customers to
meet their requirements with great confidence. We are
focused towards providing a challenging and suitable working
environment for the employees. We are proud on our long
term and flexible relationships with the customers. Our
values are professional excellence, work ethic and
commitment.
IT infrastructure overview of the
organization
• Backups
• Change control
• Management of hardware and software
• Central Computing
• Supervision tools for systems
• Security
•Backups

Information Security Program


Program Objectives
• The objectives of the plan of our organization are to assure the security and
confidentiality of the information given by our customers. Our system provides
protection against any threats. Unauthorized access is completely protected
and avoids any difficulty for the customers. This program is completely
safeguarded by the program coordinator.
Action Steps
• To assess the requirements of the program is the basic step that is required. Up gradation
of the project by the project manager consultant will help to overcome the risks and
threats faced by the company. Infrastructure project manager will handle the power
exchange, workload automation, data power and work related to the server.
Security plans and policies
• Protection by the firewall

• Hierarchical Storage Management (HSM) system

• Computer-Telephony Integration (CTI)

• Business Continuity (“Disaster Recovery”)

• Installation procedures

You might also like