下载此文档

建立一个安全有效的风险模型进行外包决策【外文翻译】.doc


文档分类:论文 | 页数:约11页 举报非法文档有奖
1/11
下载提示
  • 1.该资料是网友上传的,本站提供全文预览,预览什么样,下载就什么样。
  • 2.下载该文档所得收入归上传者、原创者。
  • 3.下载的文档,不会出现我们的网址水印。
1/11 下载此文档
文档列表 文档介绍
本文档来自高校大学生毕业论文答辩过程材料,版权归原作者所有,供下载者论文创作参考借鉴之用,请勿作商用!本科毕业论文(设计)
外文翻译
原文:
Creating an effective security risk model for outsourcing decisions
BT has substantial experience of outsourcing and off-shoring, particularly to panies, and supplier engagement processes are well established . BT outsources information munications technologies (ICT) work to bination of strategic and tactical suppliers. mon contractual framework has been implemented for strategic partners since 2003 and this includes prehensive set of baseline security requirements that can be enhanced to appropriate levels, depending on the nature of the information assets concerned. BT has redefined offshore outsourcing from being a tactical means of reducing operational costs, into a strategic tool for business transformation. This has resulted in a significant increase in the outsourcing and offshoring of ICT development, maintenance, support and contact centre activities. At the same time, customers and stakeholders are ing aware of their increasing reliance on electronic information and the risks posed by not just malicious acts, but also accidental exposure.
Outsourcing and offshoring presents a plex picture for conducting security risk assessments and the es may have a major impact on operational and business decisions. BT has therefore reviewed its approaches to security risk management to ensure that outsourcing assessments are built into the new dynamic environment in which ICT programmes exist. This paper details the evolution of processes to meet these new needs. Specific models, tools and techniques have been developed to ensure that effective and timely engagement with stakeholders occurs, that risks and requirements are identified municated, and that risk mitigation and management strategies are implemented within pliance and governance frameworks. The approach used by BT is based on HMG’s Infosec Standard No 1: Residual Risk Assessment Method (IS1) .
Security issues and risks are likely to change when sourcing outside your anisation even if

建立一个安全有效的风险模型进行外包决策【外文翻译】 来自淘豆网m.daumloan.com转载请标明出处.

非法内容举报中心
文档信息
  • 页数11
  • 收藏数0 收藏
  • 顶次数0
  • 上传人问道九霄
  • 文件大小0 KB
  • 时间2012-01-06