One Article Review

Accueil - L'article:
Source NoticeBored.webp NoticeBored
Identifiant 458585
Date de publication 2018-01-12 17:54:28 (vue: 2018-01-12 17:54:28)
Titre NBlog January 12 - microwave ready meals
Texte February's working title "Protecting information" is so vague as to be almost meaningless, yet it is written in an active sense, hinting at the process or practice of protecting information - the things we actually do, or should consider doing at least. We might instead have gone for "Information protection", placing more emphasis on the principles than the practices but, in keeping with yesterday's piece about engaging our reader on an individual basis, the new materials will be relatively simple and pragmatic: I'm thinking checklists and action plans, stuff that the reader can pick up and use directly.More "Microwave ready meal" than "Michelin chef's secret recipe".Leafing through our stash of awareness content, we have previously delved into information classification schemes (what they are for, how they are designed and how they typically work): this time around we might skim or ignore the theory to focus on using classification in practice, as a workplace tool - how to do it, basically.Hmmm, I wonder if I can write a Haynes Manual-style step-by-step classification guide, with pictures?We've also explored knowledge management and intellectual property rights before - again fairly academic or theoretical concerns. It will take a bit more head-scratching to think of practical applications that people can relate to. Straight-talking advice on 'What to look for in a license' maybe?  Maybe not.Another area we have covered repeatedly is information risk management, a structured approach that underpins the entire domain, including the ISO27k standards. The management aspects remain relevant for our customers' managers but for February I'm tempted to skirt around the conventional information risk and security perspective (identifying and characterising the risks, then applying security controls to mitigate them) to find real-world examples of risk avoidance, risk sharing and/or risk acceptance. So now I'm on the look-out for examples of real-world situations where tightening the controls is not necessarily the best approach ....
Envoyé Oui
Condensat about academic acceptance action active actually advice again almost also and/or another applications approach are area around aspects avoidance awareness basically basis before best bit but can characterising checklists chef classification classification in concerns consider content controls conventional covered customers delved designed directly doing domain emphasis engaging entire examples explored fairly february find focus gone guide have haynes head hinting hmmm how identifying ignore including individual information instead intellectual iso27k january keeping knowledge leafing least license look management managers manual materials maybe meal meals meaningless michelin microwave might mitigate more nblog necessarily new not now out people perspective pick pictures piece placing plans practical practice practices pragmatic: previously principles process property protecting protection reader ready real recipe relate relatively relevant remain repeatedly rights risk risks schemes scratching secret security sense sharing should simple situations skim skirt standards stash step straight structured stuff style take talking tempted than them then applying theoretical theory things think thinking through tightening time title tool typically underpins use using vague what where will wonder work working workplace world write written yesterday yet
Tags
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: