17.01.2014 Views

Information Security in Korea IT839 strategy

Information Security in Korea IT839 strategy

Information Security in Korea IT839 strategy

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

23<br />

Strategies for Achievement<br />

<strong>Security</strong> Plan <strong>in</strong> parallel with other <strong>IT839</strong> Master Plans<br />

Develop<strong>in</strong>g <strong>Security</strong> Plan related with BcN, USN master plans<br />

Increase efficiency and productivity<br />

From Post-Response to Prior Prevention<br />

<strong>Security</strong> Impact Assessment for upcom<strong>in</strong>g threats<br />

Bus<strong>in</strong>ess Cont<strong>in</strong>uity Plann<strong>in</strong>g for seamless service<br />

Partnership with Enterprise <strong>in</strong> Technology Development<br />

Government's support competitive security hi-tech of enterprise<br />

<strong>Information</strong> <strong>Security</strong> Governance<br />

Revise <strong>in</strong>formation security law (government)<br />

Develope hi-end security technology (enterprise)<br />

Practice Culture of <strong>Security</strong> (<strong>in</strong>dividual)

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!