Information security analysis on physical security in university x using maturity model

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A cyclical evaluation model of information security maturity

! ABSTRACT Purpose The lack of a security evaluation method might expose organizations to several risky situations. This paper aims at presenting a cyclical evaluation model of information security maturity. Design/methodology/approach This model was developed through the definition of a set of steps to be followed in order to obtain periodical evaluation of maturity and continuous improvement ...

متن کامل

Isfam: the Information Security Focus Area Maturity Model

Information security is mainly a topic that is considered to be information technology related. However, to successfully implement information security, an organization’s information security program should reflect the business strategy. Nowadays information security is in many companies enforced by the information technology department, based on what they think should be in place to protect th...

متن کامل

Security Vigilance System through Level Driven Security Maturity Model

Success of any software system largely looms upon its vigilance efficiency that prompts organizations to meet the set of objectives in the arena of networks. In the highly competitive world, everything appears to be vulnerable; information system is also not an exception to this fact. The security of information system has become a cause of great concern. On the contrary, till time the software...

متن کامل

Investigating the Physical Security Dimensions Affecting Volleyball Stadiums Security

 The present study aimed at investigating the physical security dimensions affecting the security of volleyball stadiums in Iran. The study employed a descriptive-exploratory research method conducted on 115 managers and officials in volleyball stadiums, presidents and experts of Provincial Volleyball Boards as well as experts in the field of sports facilities and events as wel...

متن کامل

Using a Capability Maturity Model to Derive Security Requirements

A security engineer is often assigned to a project that already has defined security objectives. But on occasion, the security engineer may be tasked with the initial definition of the objectives. While this assignment may be exciting because of the important role the security engineer is to play, it may also be somewhat daunting due to the large solution space. In order to guide one’s efforts ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Jurnal Informatika

سال: 2020

ISSN: 2528-6374,1978-0524

DOI: 10.26555/jifo.v14i2.a14434