Information Security System2
Information Security System2
Information Security System2
1.Policies: The outer layer in the target diagram, which reflects that most users must first interact
with InfoSec. Policies are in place to guide the setup and usage of the Network, Systems, and
Applications, as well as to ensure that steps are in place for handling misuse. It also expresses the
views of management and the will and direction they have to the corporation and its resources.
2. Networks: When threats from public networks hit the company's network infrastructure.
Without the network layer the components of the systems layer would not be able to
communicate with each other or the outside world, which would then render the application layer
less useful (and depending on the specific implementation could render it completely
useless).This layer is also the layer that is most likely to get attacked from outside because
without interfering this layer they can go further inside.
3.Systems: Includes computers used as servers, desktop computers, and systems for process
control and manufacturing systems. This layer supports the Application layer, because without
systems in place, then the applications would be able to be used. Once again, any oversight in
this layer can leave holes and gaps in protection and security.
4.Applications: It Include all the application systems that is used by the organizati0on for
everything from resource management and processing application to email and word processing
software