International Journal of Advanced Research in Computer Engineering & Technology
One of the foremost small businesses security concerns is the protection of critical information, both within their internal financial infrastructures and from external elements. Studies show that most cyber-attacks occur inside organizations, instigated by personnel with valid access to the system. The key to creating useful, transparent and enforceable network security comes from adopting a process that provides broad-based needs input, careful identification of network resource and access requirements, and data-driven implementation and management services. This paper describes about the information security, and the development and management of information security lifecycle.