Question

I would like to translate it from English to Arabic please?1.3.5 Data Security Organization Depending on the size of the enterprise, the overall Information Security function may be th

0 0
Add a comment Improve this question Transcribed image text
Answer #1

English Translation

Depending on the size of the enterprise, the overall Information Security function may be the primary responsibility of a dedicated information Security group, usually within the Information Technology (IT) area, Larger enterprises often have a Chief Information Security Officer (C ISO) who reports to either the CIO or the CEO. in organizations without dedicated Information Security personnel, responsibility for data security will fall on data managers. In all cases, data managers need to be involved in data security efforts.
In large enterprises, the information security personnel may let specific data governance and user authorization functions be guided by the business managers. Examples Include granting User authorizations and data regulatory compliance Dedicated Information Security personnel are often most concerned with the technical aspects of information protection such as combating malicious software and system attacks, However, them is ample room for collaboration during development or an installation project
This opportunity for synergy is often missed when the two governance entities, IT and Data Management, lack an organized process to share regulatory and security requirements. They need a standard procedure to inform

Arabic Translation

اعتمادًا على حجم المؤسسة ، قد تكون الوظيفة العامة لأمن المعلومات هي المسؤولية الأساسية لمجموعة مخصصة لأمن المعلومات ، وعادة ما تكون داخل منطقة تكنولوجيا المعلومات (IT) ، غالبًا ما يكون لدى الشركات الأكبر حجمًا رئيس أمن معلومات (C ISO) الذي يقدم تقارير إلى رئيس قسم المعلومات أو الرئيس التنفيذي. في المنظمات التي ليس لديها أفراد أمن معلومات مخصصين ، تقع مسؤولية أمن البيانات على مديري البيانات. في جميع الحالات ، يحتاج مديرو البيانات إلى المشاركة في جهود أمن البيانات. في الشركات الكبيرة ، قد يسمح موظفو أمن المعلومات بتوجيه إدارة بيانات معينة ووظائف ترخيص المستخدم بواسطة مديري الأعمال. تتضمن الأمثلة منح تفويضات المستخدم والامتثال التنظيمي للبيانات. غالبًا ما يهتم موظفو أمن المعلومات المخصصون بالجوانب التقنية لحماية المعلومات مثل مكافحة البرامج الضارة وهجمات النظام ، ومع ذلك ، فهي مجال واسع للتعاون أثناء التطوير أو مشروع التثبيت غالبًا ما تضيع هذه الفرصة للتآزر عندما يفتقر كيان الحوكمة ، تكنولوجيا المعلومات وإدارة البيانات ، إلى عملية منظمة لمشاركة المتطلبات التنظيمية والأمنية. إنهم بحاجة إلى إجراء قياسي للإبلاغ
  

Arabic english Translation

aetmadana ealaa hajm almuasasat , qad takun alwazifat aleamat li'amn almaelumat hi almaswuwliat al'asasiat limajmueat mukhasasat li'amn almaelumat , waeadat ma takun dakhil mintaqat tiknulujia almaelumat (IT) , ghalbana ma yakun ladaa alsharikat al'akbar hjmana rayiys 'amn maelumat (C ISO) aldhy yuqadim taqarir 'iilaa rayiys qism almaelumat 'aw alrayiys altanfidhi. fi almunazamat alty lays ladayha 'afrad 'amn maelumat mukhsisin , taqae maswuwliat 'amn albayanat ealaa mudiri albianati. fi jmye alhalat , yahtaj madiru albayanat 'iilaa almusharakat fi juhud 'amn albayanati. fi alsharikat alkabirat , qad yasmah muzafu 'amn almaelumat bitawjih 'iidarat bayanat mueayanat wawazayif tarkhis almustakhdam bwastt mudiri al'aemal. tatadaman al'amthilat manh tafwidat almustakhdam walaimtithal altanzimii lilbayanati. ghalbana ma yahtamu muzifu 'amn almaelumat almukhasisun bialjawanib altaqniat lihimayat almaelumat mithl mukafahat albaramij alddarat wahajamat alnizam , wamae dhlk , fahi majal wasie liltaeawun 'athna' altatwir 'aw mashrue altathabiyat ghalbana ma tudie hadhih alfursat liltaazir eindama yaftaqir kian alhawkamat , tiknulujia almaelumat wa'iidarat albayanat , 'iilaa eamaliat munazamat limusharakat almutatalabat altanzimiat wal'amniati. 'iinahum bihajat 'iilaa 'iijra' qiasiin lil'iiblagh

Add a comment
Know the answer?
Add Answer to:
I would like to translate it from English to Arabic please? 1.3.5 Data Security Organization Depending...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • I need help with my very last assignment of this term PLEASE!!, and here are the instructions: After reading Chapter T...

    I need help with my very last assignment of this term PLEASE!!, and here are the instructions: After reading Chapter Two, “Keys to Successful IT Governance,” from Roger Kroft and Guy Scalzi’s book entitled, IT Governance in Hospitals and Health Systems, please refer to the following assignment instructions below. This chapter consists of interviews with executives identifying mistakes that are made when governing healthcare information technology (IT). The chapter is broken down into subheadings listing areas of importance to understand...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT