Font Size: a A A

Research Of Information Security Strategy Of The HD Enterprise

Posted on:2016-10-17Degree:MasterType:Thesis
Country:ChinaCandidate:B LiuFull Text:PDF
GTID:2309330464970734Subject:Business administration
Abstract/Summary:PDF Full Text Request
Today’s world, companies have realized the important role of information technology to improve the productivity and efficiency of enterprise plays, enterprise information technology has become an important part of their daily work indispensable same enterprise information security is also facing each wide variety of threats to the daily operational activities of enterprises enormous risks and challenges, so the study of enterprise information security has become an increasingly urgent and practical needs, many business managers have been aware of this, they have put the information Security upgrade to a strategic height of enterprises, requires companies to make information security strategy in line with their needs, and to implement them.HD is a foreign company, a foreign car manufacturer subsidiaries in China, mainly engaged in related production, research and development, sales and overall business daily vehicle production and business activities are carried out on information systems, so companies need to establish a compliance with information security strategy to their needs, and for achieving this objective, through technical and administrative means to design and build an increasingly comprehensive information security system is an urgent demand for the company. In this paper, corporate strategy from the perspective of a combination of domestic and international information security theories and standards, as well as from a management point of view and can be implemented to study the HD’s overall information security strategy, and propose a corresponding gradual improvement can and HD for the company’s information security solutions.HD is a typical company’s manufacturing enterprises, other similar types of manufacturing enterprises are also facing the same problem, so the research of this paper can other companies learn and play the same type of reference.
Keywords/Search Tags:Information security strategy, Information technology, Information security
PDF Full Text Request
Related items