Security Management

The objective of security management is to coaching ensure the accuracy, strategy integrity, and protection of all human resources processes and customer service information systems.
This minimizes security administration errors, fraud and lost in information systems that interface to existing companies, as well as their customers, suppliers and training other Twitter stakeholders.
Involves using special mathematical algorithms, or keys, to convert digital data into encrypted leaders code before innovation transmission and decrypted when they are received. The most common method is called public key method, which is exclusively for the receptor that is known by the transmitter.
It can be a communications skills processor, typically a router or a dedicated server, along with software firewall. Serves as a system of ‘keeper’ that protects a company intranets and other computer networks from intrusion by providing a filter and safe transfer point for access to Internet and other networks.
Defenses against denial of service
The denial of service attacks through the Internet depends on 3 levels of interconnected systems:
1) The website of the victim 2) The Internet service provider 3) The zombie machines
Monitoring email
Protection from viruses
Many companies management create defenses against the spread of viruses by centralizing the distribution and updating antivirus software as the responsibility of their information systems departments.
O ‘brien, James A. (2006). Management Information Systems. Mexido DF.