Information Assurance Program
FPPT.com
Introduction
• Our organization is based on providing online privacy services. The organization is working in
computing, telecommunication, and network facilities. It also provides selection, management,
application and working of computing and communication equipment.
• The facilities are provided to physically secure areas and access is only given to few authorized members.
Computing and telecommunication sites and technical areas will be logged automatically.
• The complete network of system is password protected. Our organization also provides a strong alarm
system. Alarm system is monitored 24 hours and 7 days a week.
• Round the clock monitoring provides any unauthorized interruption, fire detection, flood detection etc. In
some cases it also provides video surveillance.
• Software of the systems and related products are upgraded on regular basis. To ensure continuing quality
services vendor bug fixes is installed. On weekdays operators deal with alerts, networks and any problems
that arise within the system. Special working equipments have been built to detect the failure of even a
single unit. Replacement parts’ stock has been reserved to maintain servers and networks.
Vision and Mission Statements
Vision statement
• To be a supportive information security provider that helps
the small and large businesses all over the world.
Mission Statement:
• Our mission is to provide extraordinary and managed services
by high quality and secure IT system. It allows customers to
meet their requirements with great confidence. We are
focused towards providing a challenging and suitable working
environment for the employees. We are proud on our long
term and flexible relationships with the customers. Our
values are professional excellence, work ethic and
commitment.
IT infrastructure overview of the
organization
• Backups
• Change control
• Management of hardware and software
• Central Computing
• Supervision tools for systems
• Security
•Backups
Information Security Program
Program Objectives
• The objectives of the plan of our organization are to assure the security and
confidentiality of the information given by our customers. Our system provides
protection against any threats. Unauthorized access is completely protected
and avoids any difficulty for the customers. This program is completely
safeguarded by the program coordinator.
Action Steps
• To assess the requirements of the program is the basic step that is required. Up gradation
of the project by the project manager consultant will help to overcome the risks and
threats faced by the company. Infrastructure project manager will handle the power
exchange, workload automation, data power and work related to the server.
Security plans and policies
• Protection by the firewall
• Hierarchical Storage Management (HSM) system
• Computer-Telephony Integration (CTI)
• Business Continuity (“Disaster Recovery”)
• Installation procedures