id author title date pages extension mime words sentences flesch summary cache txt cord-023944-pufcn56j Fibikova, Lenka Threats, Risks and the Derived Information Security Strategy 2012-06-04 .txt text/plain 3858 223 39 • information users, or how people handle ioformation and use tools and applications properly to protect ioformation • Business processes, or how ioformation security is embedded withio working practices • Applications, or how well they are developed to ensure the protection of iofonnation stored and processed • infrastructure, or how well it provides sufficient capacities and adequate protection of infonnation and applications against unauthorized access and modification Infonnation security is ensured via implementation of various measures. These measures need to • cover all aspects of the four areas-iofonnation users, busioess processes, applications and infrastructure (completeness) • provide adequate protection for ioformation (effectiveness) • be seamiessly iotegrated ioto the processes (integration) • be supported by efficient tools and simple templates (support) • avoid putting an unacceptable burden on the employees (simplicity) Each of these properties is crucial for achieving effective protection of information. ./cache/cord-023944-pufcn56j.txt ./txt/cord-023944-pufcn56j.txt