18.12.2012 Views

Proceedings

Proceedings

Proceedings

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

greater confidence in the organization certified; indication of the performance by the<br />

organization of the conditions of the standard ISO 27001 (this standard contains<br />

among other things, the best recommendations made by the experts in security);<br />

reducing the need for a possible system security assessment on the part of customers<br />

or business partners; the opportunity to meet all the conditions of eligibility to tender,<br />

where certification of ISMS is a criteria; better image and position in the market, in<br />

the face of competition (ISO27001, 2008).<br />

Quantification of costs is one of the core issues in the information strategy. Thus, in<br />

the phase of setting up the company, the risk is due to the latest generation<br />

technologies used and untested enough, leading to high costs.<br />

In the maturity stage of the business, the costs are due to outdated technologies which<br />

must be replaced by those of the last generation. The acquisition of advanced<br />

technologies will lead to the elimination of a part of risks, if they are chosen<br />

according to the requirements of business and are implemented at normal parameters.<br />

Advantages of the implementation of information strategies are due to the large extent<br />

exact which planned parallel development stages are: marketing, management, IT,<br />

security. Also, the implementation there of in the framework of a business entity level<br />

leads to clarity of the requirements of the business of supply, ensuring the quality and<br />

efficiency of an activity at low cost.<br />

Synthetic, in relation with the business requirements, we consider the original input<br />

data, as in company, the information system. As data output, we ask for information<br />

system performing, secure, based on innovation and competition.<br />

At the level of internal processing company, we have: models of strategy, models of<br />

security (security policy), the re-technology model of a task, the methodology for the<br />

audit of security, the methodology for the audit of information systems management,<br />

model of outsourcing services, model predictive society architecture informational<br />

strategy analysis of society based on the experience of other undertakings resulting<br />

from the development of a set of questionnaires.<br />

CONCLUSIONS<br />

The proposals for detailed building information develop strategies based on the<br />

following requirements: online Business and marketing website; the establishment of<br />

a security policy of the level of the entity that contains both information system and<br />

computer system; management, planning and organization of the information system;<br />

the latest generation of advanced technologies and their appropriate use in business<br />

activities; predictive aligned with the Business Entity online; informational flow<br />

within the framework of the strategies and risk assessment; outsourcing services and<br />

risk assessment of internal and external company; model of re-technology if renewing<br />

a technology aged and not only; the development and consolidation of information<br />

strategies; methodology of information systems audit and security management.<br />

IT infrastructure of an organization is adopted to meet the requirements of current<br />

capabilities to improve trade and network expansion requirements to partners and<br />

service providers. Trends such as virtualization and wireless are related to<br />

infrastructure concerning the optimization and flexibility. Also, rising security threats<br />

~ 675 ~

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!